From 361bf21e90f4e6a365d656e60302fd86108dbe45 Mon Sep 17 00:00:00 2001 From: Harshvardhan Pandit Date: Tue, 1 Oct 2024 01:25:56 +0100 Subject: [PATCH] adds consolidated RISK taxonomy #181 - creates a new structuring/organisation of RISK taxonomy related to risk sources, risks, consequences, and impacts where each concept can take on different roles depending on the use-case - to express this, each concept is created as an instance of new concepts e.g. `PotentialRiskSource` or `PotentialImpact` - the concepts are now provided in a module `risk_taxonomy` instead of `risk_consequences` (which has been deleted) - the HTML documentation provides new sections for each of the `Potential...` concept along with an overview table for roles - the HTML documentation does NOT provide description of the new model or examples, this is TODO - this work is with thanks to discussions with @delaramglp and Rob Brennan - #182 added bias concepts - #185 removed risk:Fee as it has been added to DPV as dpv:FeeRequirement - #190 added discrimination concepts - #184 added rights impact concepts in RISK --- 2.1-dev/dpv/dpv-en.html | 6 +- 2.1-dev/dpv/dpv-owl.html | 4 +- 2.1-dev/dpv/dpv-owl.jsonld | 28902 ++++++------- 2.1-dev/dpv/dpv-owl.n3 | 20 +- 2.1-dev/dpv/dpv-owl.rdf | 18604 ++++----- 2.1-dev/dpv/dpv-owl.ttl | 20 +- 2.1-dev/dpv/dpv.csv | 42 +- 2.1-dev/dpv/dpv.html | 6 +- 2.1-dev/dpv/dpv.jsonld | 33404 ++++++++-------- 2.1-dev/dpv/dpv.n3 | 20 +- 2.1-dev/dpv/dpv.rdf | 18902 ++++----- 2.1-dev/dpv/dpv.ttl | 20 +- 2.1-dev/dpv/index-en.html | 6 +- 2.1-dev/dpv/index.html | 6 +- 2.1-dev/dpv/modules/risk-en.html | 8 +- 2.1-dev/dpv/modules/risk-owl.html | 21534 +++++++--- 2.1-dev/dpv/modules/risk-owl.jsonld | 1792 +- 2.1-dev/dpv/modules/risk-owl.n3 | 6 +- 2.1-dev/dpv/modules/risk-owl.rdf | 898 +- 2.1-dev/dpv/modules/risk-owl.ttl | 6 +- 2.1-dev/dpv/modules/risk.csv | 2 +- 2.1-dev/dpv/modules/risk.html | 8 +- 2.1-dev/dpv/modules/risk.jsonld | 1964 +- 2.1-dev/dpv/modules/risk.n3 | 6 +- 2.1-dev/dpv/modules/risk.rdf | 760 +- 2.1-dev/dpv/modules/risk.ttl | 6 +- 2.1-dev/risk/index-en.html | 22042 ++++++---- 2.1-dev/risk/index.html | 22042 ++++++---- 2.1-dev/risk/modules/bias-owl.jsonld | 1624 - 2.1-dev/risk/modules/bias-owl.n3 | 382 - 2.1-dev/risk/modules/bias-owl.rdf | 413 - 2.1-dev/risk/modules/bias-owl.ttl | 382 - 2.1-dev/risk/modules/bias.csv | 23 - 2.1-dev/risk/modules/bias.jsonld | 1732 - 2.1-dev/risk/modules/bias.n3 | 404 - 2.1-dev/risk/modules/bias.rdf | 436 - 2.1-dev/risk/modules/bias.ttl | 404 - 2.1-dev/risk/modules/core-owl.jsonld | 1378 +- 2.1-dev/risk/modules/core-owl.n3 | 77 + 2.1-dev/risk/modules/core-owl.rdf | 578 +- 2.1-dev/risk/modules/core-owl.ttl | 77 + 2.1-dev/risk/modules/core.csv | 7 + 2.1-dev/risk/modules/core.jsonld | 1360 +- 2.1-dev/risk/modules/core.n3 | 95 +- 2.1-dev/risk/modules/core.rdf | 438 +- 2.1-dev/risk/modules/core.ttl | 95 +- 2.1-dev/risk/modules/risk_consequences.csv | 112 - ...es-owl.jsonld => risk_taxonomy-owl.jsonld} | 6768 +++- ...nsequences-owl.n3 => risk_taxonomy-owl.n3} | 1591 +- ...equences-owl.rdf => risk_taxonomy-owl.rdf} | 3568 +- ...equences-owl.ttl => risk_taxonomy-owl.ttl} | 1591 +- 2.1-dev/risk/modules/risk_taxonomy.csv | 162 + ...nsequences.jsonld => risk_taxonomy.jsonld} | 7382 ++-- ...{risk_consequences.n3 => risk_taxonomy.n3} | 1869 +- ...isk_consequences.rdf => risk_taxonomy.rdf} | 3454 +- ...isk_consequences.ttl => risk_taxonomy.ttl} | 1869 +- 2.1-dev/risk/risk-en.html | 22042 ++++++---- 2.1-dev/risk/risk-owl.html | 12489 ++++-- 2.1-dev/risk/risk-owl.jsonld | 11985 +++--- 2.1-dev/risk/risk-owl.n3 | 1443 +- 2.1-dev/risk/risk-owl.rdf | 6969 ++-- 2.1-dev/risk/risk-owl.ttl | 1443 +- 2.1-dev/risk/risk.csv | 323 +- 2.1-dev/risk/risk.html | 22042 ++++++---- 2.1-dev/risk/risk.jsonld | 12675 +++--- 2.1-dev/risk/risk.n3 | 1763 +- 2.1-dev/risk/risk.rdf | 6596 +-- 2.1-dev/risk/risk.ttl | 1763 +- 2.1-dev/search.html | 4 +- code/100_download_CSV.py | 1 - code/300_generate_HTML.py | 15 + code/jinja2_resources/template_risk.jinja2 | 205 +- code/vocab_csv/Risk.csv | 14 +- code/vocab_csv/RiskConsequences.csv | 1986 +- code/vocab_csv/dpv-Risk.csv | 2 +- code/vocab_csv/risk.xlsx | Bin 536525 -> 474090 bytes code/vocab_funcs.py | 22 +- code/vocab_management.py | 8 +- code/vocab_schemas.py | 5 +- 79 files changed, 186266 insertions(+), 126836 deletions(-) delete mode 100644 2.1-dev/risk/modules/bias-owl.jsonld delete mode 100644 2.1-dev/risk/modules/bias-owl.n3 delete mode 100644 2.1-dev/risk/modules/bias-owl.rdf delete mode 100644 2.1-dev/risk/modules/bias-owl.ttl delete mode 100644 2.1-dev/risk/modules/bias.csv delete mode 100644 2.1-dev/risk/modules/bias.jsonld delete mode 100644 2.1-dev/risk/modules/bias.n3 delete mode 100644 2.1-dev/risk/modules/bias.rdf delete mode 100644 2.1-dev/risk/modules/bias.ttl delete mode 100644 2.1-dev/risk/modules/risk_consequences.csv rename 2.1-dev/risk/modules/{risk_consequences-owl.jsonld => risk_taxonomy-owl.jsonld} (63%) rename 2.1-dev/risk/modules/{risk_consequences-owl.n3 => risk_taxonomy-owl.n3} (54%) rename 2.1-dev/risk/modules/{risk_consequences-owl.rdf => risk_taxonomy-owl.rdf} (57%) rename 2.1-dev/risk/modules/{risk_consequences-owl.ttl => risk_taxonomy-owl.ttl} (54%) create mode 100644 2.1-dev/risk/modules/risk_taxonomy.csv rename 2.1-dev/risk/modules/{risk_consequences.jsonld => risk_taxonomy.jsonld} (60%) rename 2.1-dev/risk/modules/{risk_consequences.n3 => risk_taxonomy.n3} (52%) rename 2.1-dev/risk/modules/{risk_consequences.rdf => risk_taxonomy.rdf} (54%) rename 2.1-dev/risk/modules/{risk_consequences.ttl => risk_taxonomy.ttl} (52%) diff --git a/2.1-dev/dpv/dpv-en.html b/2.1-dev/dpv/dpv-en.html index 21d334853..d5e70f4b7 100644 --- a/2.1-dev/dpv/dpv-en.html +++ b/2.1-dev/dpv/dpv-en.html @@ -5145,7 +5145,7 @@

Risk and Impact Assessment

  • - dpv:RiskConcept: Concepts associated with Risk, Risk Source, Consequences, and Impacts + dpv:RiskConcept: Parent concept for combining concepts associated with risk assessment such as actual and potential Risk, Risk Source, Consequences, and Impacts go to full definition
  • - dpv:RiskConcept: Concepts associated with Risk, Risk Source, Consequences, and Impacts + dpv:RiskConcept: Parent concept for combining concepts associated with risk assessment such as actual and potential Risk, Risk Source, Consequences, and Impacts go to full definition
  • - dpv:RiskConcept: Concepts associated with Risk, Risk Source, Consequences, and Impacts + dpv:RiskConcept: Parent concept for combining concepts associated with risk assessment such as actual and potential Risk, Risk Source, Consequences, and Impacts go to full definition
  • - dpv:RiskConcept: Concepts associated with Risk, Risk Source, Consequences, and Impacts + dpv:RiskConcept: Parent concept for combining concepts associated with risk assessment such as actual and potential Risk, Risk Source, Consequences, and Impacts go to full definition
  • - dpv:RiskConcept: Concepts associated with Risk, Risk Source, Consequences, and Impacts + dpv:RiskConcept: Parent concept for combining concepts associated with risk assessment such as actual and potential Risk, Risk Source, Consequences, and Impacts go to full definition
      +
    • + risk:AvailabilityConcept: Indicates a concept is relevant to 'Availability' in CIA InfoSec model + go to full definition + +
    • +
    • + risk:ConfidentialityConcept: Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + go to full definition + +
    • risk:Incident: An actual or occured event go to full definition +
    • +
    • + risk:IntegrityConcept: Indicates a concept is relevant to 'Integrity' in CIA InfoSec model + go to full definition + +
    • +
    • + risk:PotentialConsequence: Indicates a concept can potentially be a 'consequence concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialImpact: Indicates a concept can potentially be a 'impact' concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialRisk: Indicates a concept can potentially be a 'risk' concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialRiskSource: Indicates a concept can potentially be a 'risk source' concept within an use-case + go to full definition +
    • risk:RiskManagement: Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk @@ -1246,8 +1312,8 @@

      Controls

      -
      -

      Consequences and Impacts

      +
      +

      Taxonomies

      @@ -1271,78 +1337,147 @@

      Consequences and Impacts

      dpv:hasImpact risk:RightsImpact . -

      The concepts taxonomy is broadly divided into the following categories:

      - - -
      -

      CIA Model

      -

      Confidentiality

      +
      +

      Potential Risk Sources

      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
          +
        • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
            +
          • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
          • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
          • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
          • - risk:Coercion: Something that acts as or causes Coercion - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
          • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
          • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
          • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
          • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
          • +
          +
        • +
        • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition
          • - risk:AvailabilityBreach: None - go to full definition + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
          • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition
          • - risk:IntegrityBreach: None - go to full definition + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
          • +
          • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
              +
            • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
            • +
            • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
            • +
            • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
                +
              • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
              • +
              • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
              • +
              • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
            • +
            +
          • +
          +
        • +
        +
      • +
      • + risk:ExternalSecurityThreat: Concepts associated with security threats that are likely to originate externally + go to full definition +
          +
        • + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition + +
        • +
        • + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition + +
        • +
        • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition +
            +
          • + risk:Blackmail: Something that acts as or causes Blackmail + go to full definition + +
          • +
          • + risk:Coercion: Something that acts as or causes Coercion + go to full definition + +
          • risk:Extorsion: Something that acts as or causes Extorsion go to full definition @@ -1367,16 +1502,6 @@

            Confidentiality

            risk:InterceptCommunications: Something that acts as or causes Interception of Communications go to full definition -
          • -
          • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition - -
          • -
          • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition -
          • risk:PhishingScam: Something that acts as or causes Phishing Scam @@ -1384,8 +1509,8 @@

            Confidentiality

          • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition
          • @@ -1394,40 +1519,45 @@

            Confidentiality

          • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:Spoofing: Something that acts as or causes Spoofing + go to full definition
          • +
          +
        • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition -
        • risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity go to full definition +
            +
          • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition
          • @@ -1454,6 +1585,11 @@

            Confidentiality

            risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition +
          • +
          • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition +
          • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1464,6 +1600,11 @@

            Confidentiality

            risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition +
          • +
          • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition +
          • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1474,6 +1615,11 @@

            Confidentiality

            risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification go to full definition +
          • +
          • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition +
          • risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access @@ -1481,78 +1627,71 @@

            Confidentiality

          • - risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data - go to full definition + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition
          • -
      - -

      Integrity

      -
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition
      • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition
      • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition
      • +
      +
    • +
    +
  • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
  • +
  • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition -
  • risk:DataCorruption: Something that acts as or causes Corruption of Data go to full definition
  • - risk:IntegrityBreach: None - go to full definition - -
  • -
  • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition - -
  • -
  • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition + risk:EquipmentFailure: Something that acts as or causes Equipment Failure + go to full definition
  • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + go to full definition
  • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
  • @@ -1583,171 +1722,228 @@

    Integrity

  • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
  • - risk:SystemIntrusion: Something that acts as or causes System Intrusion - go to full definition + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition
  • + +
  • - risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises - go to full definition + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition + +
  • + + + +
    +

    Potential Risks

    +
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • -
    - -

    Availability

    -
    • - risk:AvailabilityBreach: None - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
    • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
    • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition
    • +
    +
  • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
      +
    • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
    • - risk:Cryptojacking: Something that acts as or causes Cryptojacking - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition
    • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
    • +
    • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition
      • - risk:AvailabilityBreach: None - go to full definition + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition
      • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition
      • - risk:IntegrityBreach: None - go to full definition + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
          +
        • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition
        • -
        -
      • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) - go to full definition + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition
      • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) - go to full definition + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
      • +
      +
    • +
    +
  • + + + +
  • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure - go to full definition + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition
  • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction - go to full definition + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition
  • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition + risk:CopyrightViolation: Something that acts as or causes Copyright Violation + go to full definition
  • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
  • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
      +
    • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
        +
      • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
      • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
      • +
      +
    • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition @@ -1755,87 +1951,76 @@

      Availability

  • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition +
  • -
    - -
    -

    User

    -
  • - risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use - go to full definition + risk:IndividualHealthSafety: None + go to full definition
  • - risk:HumanErrors: Something that acts as or causes Human Errors - go to full definition + risk:Privacy: None + go to full definition
  • -
  • - risk:IntentionalMisuse: Intentional Misuse - go to full definition - +
  • - risk:Misuse: Something that acts as or causes Misuse - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
  • -
    -
    - -
    -

    Legal

    -
    • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition - -
    • + risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement + go to full definition + +
    • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition +
        +
      • + risk:Blackmail: Something that acts as or causes Blackmail + go to full definition
      • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:Coercion: Something that acts as or causes Coercion + go to full definition
      • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:Extorsion: Something that acts as or causes Extorsion + go to full definition
      • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition + risk:Fraud: Something that acts as or causes Fraud + go to full definition
      • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition
      • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition
      • -
    -
    - -
    -

    Reputational

    -
    +
  • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition +
  • -
    - -
    -

    Societal

    -
    -
    - -
    -

    Individual

    -
      +
    +
  • - risk:Harm: Something that acts as or causes Harm to humans - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
  • - risk:SexualViolence: Something that acts as or causes Sexual Violence - go to full definition + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition +
      +
    • + risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + go to full definition
    • - risk:ViolenceAgainstChildren: Something that acts as or causes Child Violence - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
    • -
  • -
    - -
    -

    Environmental

    -
    -
    - -
    -

    Financial

    -
    • - risk:Benefit: Something that acts as or causes benefits - go to full definition + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition +
        +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • +
      +
    • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
    • - risk:Fee: Something that acts as or provides fees e.g. for using a service - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
    • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • +
    +
  • - risk:JudicialCosts: Something that involves or causes judicial costs to be paid - go to full definition + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
      +
    • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition
      • - risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid - go to full definition + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition
      • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition
      • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition
      • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition
      • -
  • -
    - -
    -

    Bias

    -

    Note: These are intended to represent bias concepts in general e.g. applicable for any technology. The AI extension contains an additional set of concepts that extend these concepts to represent biases that are specific to the development and use of AI.

    -
    • - risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information - go to full definition -
        + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • - risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - go to full definition + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition
      • - risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - go to full definition + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition
      • - risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories - go to full definition + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition
      • - risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics - go to full definition + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition
        • - risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - go to full definition + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition
        • +
        +
      • - risk:RequirementsBias: Bias that occurs in or during requirements creation - go to full definition + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition
      • - risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - go to full definition + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition
      • - risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - go to full definition + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition
      • - risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - go to full definition + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition
        • - risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - go to full definition + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition
        • +
        +
      • +
      +
    • - risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - go to full definition + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition
    • - risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - go to full definition + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition
    • - risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - go to full definition + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition
      • - risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - go to full definition + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition
      • - risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - go to full definition + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition
      • - risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - go to full definition + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
    • +
    • + risk:SocietalHealthSafety: None + go to full definition + +
    • +
    • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
    • +
    + +
  • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition
    • - risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - go to full definition + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition
    • - risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - go to full definition + risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + go to full definition
    • - risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population - go to full definition + risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition + +
    • +
    • + risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + go to full definition + +
    • +
    • + risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition + +
    • +
    • + risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition
  • +
  • + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition +
  • +
  • + risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct + go to full definition + +
  • +
  • + risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations + go to full definition + +
  • +
  • + risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code + go to full definition + +
  • +
  • + risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations + go to full definition + +
  • +
  • + risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy + go to full definition + +
  • +
  • + risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations + go to full definition + +
  • - - - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    -
    -

    Risk Matrix 3x3

    - - - - - - - - - - - - - - - - - - - - - - - - - -
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    +

    Potential Consequences

    +
      +
    • + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
        • +
        • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
        • +
        • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
        • +
        • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
        • +
        • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
        • +
        • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
        • +
        • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
        • +
        • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
        • +
        • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
            • +
            +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ComponentFailure: Something that acts as or causes Component Failure + go to full definition + +
    • +
    • + risk:ComponentMalfunction: Something that acts as or causes Component Malfunction + go to full definition + +
    • +
    • + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition + +
    • +
    • + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition + +
    • +
    • + risk:CopyrightViolation: Something that acts as or causes Copyright Violation + go to full definition + +
    • +
    • + risk:DataCorruption: Something that acts as or causes Corruption of Data + go to full definition + +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:EquipmentFailure: Something that acts as or causes Equipment Failure + go to full definition + +
    • +
    • + risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + go to full definition + +
    • +
    • + risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use + go to full definition + +
    • +
    • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
        +
      • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
          +
        • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition + +
        • +
        • + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition + +
        • +
        +
      • +
      • + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
          +
        • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition + +
        • +
        • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
        • +
        • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:HumanErrors: Something that acts as or causes Human Errors + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
    • +
    • + risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement + go to full definition + +
    • +
    • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition + +
    • +
    • + risk:Misuse: Something that acts as or causes Misuse + go to full definition + +
    • +
    • + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition + +
    • +
    • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition +
        +
      • + risk:LoseCredibility: Something that acts as or causes Loss of Credibility + go to full definition + +
      • +
      • + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition + +
      • +
      • + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition + +
      • +
      • + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition + +
      • +
      • + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition + +
      • +
      • + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition + +
      • +
      • + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition + +
      • +
      +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition + +
    • +
    • + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
        +
      • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
          +
        • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
        • +
        • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
        • +
        • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
        • +
        • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
        • +
        • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
        • +
        • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
        • +
        • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
        • +
        • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
        • +
        • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
        • +
        • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
            +
          • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
          • +
          • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
          • +
          +
        • +
        • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
        • +
        • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
        • +
        • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
            +
          • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
          • +
          • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
          • +
          • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
          • +
          • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
          • +
          • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
          • +
          +
        • +
        • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
            +
          • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
          • +
          +
        • +
        +
      • +
      • + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition + +
      • +
      • + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition + +
      • +
      • + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition +
          +
        • + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
        • +
        • + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
        • +
        • + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
        • +
        • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
        • +
        • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
        • +
        • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
        • +
        • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
        • +
        +
      • +
      • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
      • +
      • + risk:SocietalHealthSafety: None + go to full definition + +
      • +
      • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
      • +
      +
    • +
    • + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition + +
    • +
    • + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition +
        +
      • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
      • +
      • + risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + go to full definition + +
      • +
      • + risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition + +
      • +
      • + risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + go to full definition + +
      • +
      • + risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition + +
      • +
      • + risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + go to full definition + +
      • +
      • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
      • +
      • + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
      • +
      • + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition + +
      • +
      • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
      • +
      • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
      • +
      • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
      • +
      +
    • +
    • + risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct + go to full definition + +
    • +
    • + risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations + go to full definition + +
    • +
    • + risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code + go to full definition + +
    • +
    • + risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations + go to full definition + +
    • +
    • + risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy + go to full definition + +
    • +
    • + risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations + go to full definition + +
    • +
    +
    + +
    +

    Potential Impacts

    +
      +
    • + risk:Damage: Something that acts as or causes Damage + go to full definition + +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
        +
      • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
          +
        • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition + +
        • +
        • + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition + +
        • +
        +
      • +
      • + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
          +
        • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition + +
        • +
        • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
        • +
        • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:MaterialDamage: Something that acts as or causes Material Damage + go to full definition + +
    • +
    • + risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage + go to full definition + +
    • +
    • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition +
        +
      • + risk:LoseCredibility: Something that acts as or causes Loss of Credibility + go to full definition + +
      • +
      • + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition + +
      • +
      • + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition + +
      • +
      • + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition + +
      • +
      • + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition + +
      • +
      • + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition + +
      • +
      • + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition + +
      • +
      +
    • +
    • + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
        +
      • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
          +
        • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
        • +
        • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
        • +
        • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
        • +
        • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
        • +
        • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
        • +
        • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
        • +
        • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
        • +
        • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
        • +
        • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
        • +
        • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
            +
          • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
          • +
          • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
          • +
          +
        • +
        • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
        • +
        • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
        • +
        • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
            +
          • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
          • +
          • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
          • +
          • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
          • +
          • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
          • +
          • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
          • +
          +
        • +
        • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
            +
          • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
          • +
          +
        • +
        +
      • +
      • + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition + +
      • +
      • + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition + +
      • +
      • + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition +
          +
        • + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
        • +
        • + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
        • +
        • + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
        • +
        • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
        • +
        • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
        • +
        • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
        • +
        • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
        • +
        +
      • +
      • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
      • +
      • + risk:SocietalHealthSafety: None + go to full definition + +
      • +
      • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
      • +
      +
    • +
    +
    + +
    +

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentialityIntegrityAvailability
    risk:AccidentalMisuse
    risk:AgeDiscrimination
    risk:AuthorisationFailure
    risk:AvailabilityBreach
    risk:Benefit
    risk:Bias
    risk:Blackmail
    risk:BruteForceAuthorisations
    risk:CasteDiscrimination
    risk:Coercion
    risk:CognitiveBias
    risk:Compensation
    risk:ComponentFailure
    risk:ComponentMalfunction
    risk:CompromiseAccount
    risk:CompromiseAccountCredentials
    risk:ConfidentialityBreach
    risk:ConfirmationBias
    risk:ConfoundingVariablesBias
    risk:CopyrightViolation
    risk:CoverageBias
    risk:Cryptojacking
    risk:Damage
    risk:DataAggregationBias
    risk:DataBias
    risk:DataBreach
    risk:DataCorruption
    risk:DataProcessingBias
    risk:DenialServiceAttack
    risk:Detriment
    risk:DirectDiscrimination
    risk:DisabilityDiscrimination
    risk:Discrimination
    risk:DistributedDenialServiceAttack
    risk:EnvironmentalRisk
    risk:EquipmentFailure
    risk:EquipmentMalfunction
    risk:ErroneousSystemUse
    risk:EthnicDiscrimination
    risk:ExcellenceDiscrimination
    risk:ExposureToHarmfulSpeech
    risk:ExternalSecurityThreat
    risk:Extorsion
    risk:FinancialImpact
    risk:FinancialLoss
    risk:Fraud
    risk:GenderDiscrimination
    risk:GeographicDiscrimination
    risk:GroupAttributionBias
    risk:Harassment
    risk:Harm
    risk:Homophobia
    risk:HumanErrors
    risk:IdentityFraud
    risk:IdentityTheft
    risk:IllegalDataProcessing
    risk:ImplicitBias
    risk:IndirectDiscrimination
    risk:IndividualHealthSafety
    risk:IndividualRisk
    risk:InformativenessBias
    risk:InGroupBias
    risk:Injury
    risk:IntegrityBreach
    risk:IntentionalMisuse
    risk:InterceptCommunications
    risk:JudicialCosts
    risk:JudicialPenalty
    risk:LanguageDiscrimination
    risk:LegalRisk
    risk:LoseCredibility
    risk:LoseCustomerConfidence
    risk:LoseGoodwill
    risk:LoseNegotiatingCapacity
    risk:LoseOpportunity
    risk:LoseReputation
    risk:LoseTrust
    risk:MaliciousActivity
    risk:MaliciousCodeAttack
    risk:MalwareAttack
    risk:MaterialDamage
    risk:Misandry
    risk:Misogyny
    risk:Misuse
    risk:NationalityDiscrimination
    risk:NonMaterialDamage
    risk:NonNormalityBias
    risk:NonResponseBias
    risk:OperationalSecurityRisk
    risk:OutGroupHomogeneityBias
    risk:Payment
    risk:PersonalSafetyEndangerment
    risk:PhishingScam
    risk:PhysicalAssault
    risk:PhysicalHarm
    risk:Privacy
    risk:PsychologicalHarm
    risk:PublicOrderBreach
    risk:RacialDiscrimination
    risk:Racism
    risk:Reidentification
    risk:ReligiousDiscrimination
    risk:Renumeration
    risk:ReputationalRisk
    risk:RequirementsBias
    risk:ReverseDiscrimination
    risk:Reward
    risk:RightEroded
    risk:RightObstructed
    risk:RightsDenial
    risk:RightsExercisePrevention
    risk:RightsImpact
    risk:RightsLimitation
    risk:RightsUnfulfilled
    risk:RightsViolation
    risk:RuleBasedSystemDesign
    risk:Sabotage
    risk:SamplingBias
    risk:Scam
    risk:SecurityAttack
    risk:SecurityBreach
    risk:SelectionBias
    risk:SexDiscrimination
    risk:Sexism
    risk:SexualHarassment
    risk:SexualOrientationDiscrimination
    risk:SexualViolence
    risk:SimpsonsParadoxBias
    risk:SocialDisadvantage
    risk:SocietalBias
    risk:SocietalHealthSafety
    risk:SocietalRisk
    risk:Spoofing
    risk:StatisticalBias
    risk:SystemFailure
    risk:SystemIntrusion
    risk:SystemMalfunction
    risk:Terrorism
    risk:Transphobia
    risk:UnauthorisedAccesstoPremises
    risk:UnauthorisedActivity
    risk:UnauthorisedCodeAccess
    risk:UnauthorisedCodeDisclosure
    risk:UnauthorisedCodeModification
    risk:UnauthorisedDataAccess
    risk:UnauthorisedDataDisclosure
    risk:UnauthorisedDataModification
    risk:UnauthorisedInformationDisclosure
    risk:UnauthorisedReidentification
    risk:UnauthorisedResourceUse
    risk:UnauthorisedSystemAccess
    risk:UnauthorisedSystemModification
    risk:UnwantedCodeDeletion
    risk:UnwantedDataDeletion
    risk:UnwantedDisclosureData
    risk:UserRisks
    risk:ViolatingCodeOfConduct
    risk:ViolatingContractualObligation
    risk:ViolatingEthicsCode
    risk:ViolatingLegalObligation
    risk:ViolatingPolicy
    risk:ViolatingStatutoryObligations
    risk:ViolenceAgainstChildren
    + +
    + +
    +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    + + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    3 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + +
    +

    Accidental Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Accidental Misuse

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalMisusePrefixrisk
    LabelAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse + → risk:UserRisks + → dpv:RiskConcept +
    DefinitionAccidental Misuse
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Age Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAgeDiscriminationPrefixrisk
    LabelAge Discrimination
    IRIhttps://w3id.org/dpv/risk#AgeDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's age, often impacting older or younger individuals
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Authorisation Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    None

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityBreachPrefixrisk
    LabelNone
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Availability Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityConceptPrefixrisk
    LabelAvailability Concept
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Availability Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + +
    +

    Avoid Source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that avoids the risk source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + +
    +

    Benefit

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBenefitPrefixrisk
    LabelBenefit
    IRIhttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Compensation + → risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes benefits
    Date Created2022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBiasPrefixrisk
    LabelBias
    IRIhttps://w3id.org/dpv/risk#Bias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskConcept +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    + + + + + + + +
    +

    Blackmail

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBlackmailPrefixrisk
    LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Blackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Brute Force Authorisations

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBruteForceAuthorisationsPrefixrisk
    LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Caste Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCasteDiscriminationPrefixrisk
    LabelCaste Discrimination
    IRIhttps://w3id.org/dpv/risk#CasteDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's caste, a form of social stratification found in some cultures
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Change Consequence

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + +
    +

    Change Impact

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + + +
    +

    Coercion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Coercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Cognitive Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCognitiveBiasPrefixrisk
    LabelCognitive Bias
    IRIhttps://w3id.org/dpv/risk#CognitiveBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when humans are processing and interpreting information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    + + + + + + +
    +

    Compensation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Component Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentFailurePrefixrisk
    LabelComponent Failure
    IRIhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Component Failure
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Component Malfunction

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentMalfunctionPrefixrisk
    LabelComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Component Malfunction
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + + + +
    +

    Compromise Account

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiser
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Compromise Account Credentials

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Account Credentials to be compromised
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Confidentiality Breach

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityBreachPrefixrisk
    LabelConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Confidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Confidentiality Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityConceptPrefixrisk
    LabelConfidentiality Concept
    IRIhttps://w3id.org/dpv/risk#ConfidentialityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Confidentiality Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityIncidentPrefixrisk
    LabelConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Confirmation Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfirmationBiasPrefixrisk
    LabelConfirmation Bias
    IRIhttps://w3id.org/dpv/risk#ConfirmationBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Confounding Variables Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfoundingVariablesBiasPrefixrisk
    LabelConfounding Variables Bias
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + +
    +

    Consequence Control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConsequenceControlPrefixrisk
    LabelConsequence Control
    IRIhttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionRisk Mitigation Measure that controls the Consequences
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + +
    +

    Containment Control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermContainmentControlPrefixrisk
    LabelContainment Control
    IRIhttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl to contain event
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK +
    + + + + + +
    +

    Copyright Violation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
    -

    Risk Matrix 5x5

    -
    TermCopyrightViolationPrefixrisk
    LabelCopyright Violation
    IRIhttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ViolatingObligation +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + + + +
    DefinitionSomething that acts as or causes Copyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Very LowLowModerateHighVery HighSee More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + + +
    +

    Coverage Bias

    + + + + + + + - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoverageBiasPrefixrisk
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]LabelCoverage Bias
    IRIhttps://w3id.org/dpv/risk#CoverageBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Cross-Border Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCrossBorderIncidentPrefixrisk
    LabelCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Cryptojacking

    + + - - - - - - + + + + - - - - - - + + - - - - - - - + + + - - - - - - - + + + + + + -
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]TermCryptojackingPrefixrisk
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]LabelCryptojacking
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    IRIhttps://w3id.org/dpv/risk#Cryptojacking
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    -
    + + + Broader/Parent types + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept + + + -
    -

    Risk Matrix 7x7

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    DefinitionSomething that acts as or causes Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Damage

    + + - - - - - - - - + + + + - - - - - - - - + + - - - - - - - - - + + + - - - - - - - - - + + + + + + -
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]TermDamagePrefixrisk
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]LabelDamage
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    IRIhttps://w3id.org/dpv/risk#Damage
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    -
    + + + Broader/Parent types + risk:LegalRisk + → dpv:RiskConcept + + + -
    + + + + + + + Definition + Something that acts as or causes Damage + + + -
    -

    Vocabulary Index

    -
    -

    Classes

    - - + + + + + + + + Date Created + 2022-03-30 + + + Date Modified + 2024-08-16 + + + Contributors + Harshvardhan J. Pandit + + + + See More: + section RISK-TAXONOMY in RISK + + + + +
    +
    +

    Data Aggregation Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataAggregationBiasPrefixrisk
    LabelData Aggregation Bias
    IRIhttps://w3id.org/dpv/risk#DataAggregationBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Data Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataBiasPrefixrisk
    LabelData Bias
    IRIhttps://w3id.org/dpv/risk#DataBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -2424,7 +9305,88 @@

    Classes

    +
    +

    Data Breach

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataBreachPrefixrisk
    LabelData Breach
    IRIhttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in DEX +
    +
    @@ -2432,87 +9394,371 @@

    Classes

    +
    +

    Data Corruption

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataCorruptionPrefixrisk
    LabelData Corruption
    IRIhttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Data Processing Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataProcessingBiasPrefixrisk
    LabelData Processing Bias
    IRIhttps://w3id.org/dpv/risk#DataProcessingBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Deliberate Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDeliberateIncidentPrefixrisk
    LabelDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to deliberate actions of a human
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    +
    +

    Denial of Service Attack (DoS)

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDenialServiceAttackPrefixrisk
    LabelDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    3 Likelihood Levels

    +
    +

    Detection Control

    - + - + - + - + - - @@ -2523,7 +9769,7 @@

    3 Likelihood Levels

    - + @@ -2536,18 +9782,15 @@

    3 Likelihood Levels

    - + - - - - + - @@ -2556,43 +9799,42 @@

    3 Likelihood Levels

    -
    -

    3 Risk Levels

    + + +
    +

    Detriment

    Term3LikelihoodLevelsDetectionControl Prefix risk
    Label3 Likelihood LevelsDetection Control
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevelshttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 3 Likelihood Levels from High to LowControl to detect event
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -2601,7 +9843,7 @@

    3 Risk Levels

    - + @@ -2614,18 +9856,21 @@

    3 Risk Levels

    - + - + + + + - + - @@ -2634,43 +9879,48 @@

    3 Risk Levels

    -
    -

    3 Severity Levels

    + + + +
    +

    Direct Discrimination

    Term3RiskLevelsDetriment Prefix risk
    Label3 Risk LevelsDetriment
    IRIhttps://w3id.org/dpv/risk#3RiskLevelshttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to LowSomething that acts as or causes Detriment
    Date Created2022-08-182022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2679,7 +9929,7 @@

    3 Severity Levels

    - + @@ -2692,18 +9942,15 @@

    3 Severity Levels

    - + - - - - + - @@ -2712,43 +9959,48 @@

    3 Severity Levels

    -
    -

    5 Likelihood Levels

    + + + +
    +

    Disability Discrimination

    Term3SeverityLevelsDirectDiscrimination Prefix risk
    Label3 Severity LevelsDirect Discrimination
    IRIhttps://w3id.org/dpv/risk#3SeverityLevelshttps://w3id.org/dpv/risk#DirectDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:Severity + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 3 Severity Levels from High to LowOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2757,7 +10009,7 @@

    5 Likelihood Levels

    - + @@ -2770,18 +10022,15 @@

    5 Likelihood Levels

    - + - - - - + - @@ -2790,43 +10039,47 @@

    5 Likelihood Levels

    -
    -

    5 Risk Levels

    + + + + +
    +

    Discrimination

    Term5LikelihoodLevelsDisabilityDiscrimination Prefix risk
    Label5 Likelihood LevelsDisability Discrimination
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevelshttps://w3id.org/dpv/risk#DisabilityDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:Likelihood + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very LowDiscrimination against individuals based on physical or mental disabilities
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2835,7 +10088,7 @@

    5 Risk Levels

    - + @@ -2848,18 +10101,21 @@

    5 Risk Levels

    - + - + + + + - + - @@ -2868,43 +10124,45 @@

    5 Risk Levels

    -
    -

    5 Severity Levels

    + + + +
    +

    Distributed Denial of Service Attack (DDoS)

    Term5RiskLevelsDiscrimination Prefix risk
    Label5 Risk LevelsDiscrimination
    IRIhttps://w3id.org/dpv/risk#5RiskLevelshttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskLevel + risk:RiskConcept +
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very Low[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]
    Date Created2022-08-182024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -2913,22 +10171,28 @@

    5 Severity Levels

    - + - + + + + - + - + + + + @@ -2937,7 +10201,7 @@

    5 Severity Levels

    - @@ -2945,42 +10209,42 @@

    5 Severity Levels

    - -
    -

    7 Likelihood Levels

    +
    +

    Environmental Incident

    Term5SeverityLevelsDistributedDenialServiceAttack Prefix risk
    Label5 Severity LevelsDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#5SeverityLevelshttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Severity + risk:DenialServiceAttack + → risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 5 Severity Levels from Very High to Very LowSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -2991,7 +10255,7 @@

    7 Likelihood Levels

    - + @@ -3004,18 +10268,15 @@

    7 Likelihood Levels

    - + - - - - + - @@ -3024,43 +10285,42 @@

    7 Likelihood Levels

    -
    -

    7 Risk Levels

    + + + +
    +

    Environmental Risk

    Term7LikelihoodLevelsEnvironmentalIncident Prefix risk
    Label7 Likelihood LevelsEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevelshttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types dpv:Likelihood + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood + risk:hasIncident
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely LowIncident caused due to environmental factors outside human controls
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -3069,7 +10329,7 @@

    7 Risk Levels

    - + @@ -3080,20 +10340,14 @@

    7 Risk Levels

    - - - - + - - - - + - @@ -3102,43 +10356,44 @@

    7 Risk Levels

    -
    -

    7 Severity Levels

    + + + + +
    +

    Equipment Failure

    Term7RiskLevelsEnvironmentalRisk Prefix risk
    Label7 Risk LevelsEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#7RiskLevelshttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely LowRisks and issues that have their origin in environment or can affect the environment at large
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3147,22 +10402,31 @@

    7 Severity Levels

    - + - + + + + - + + + + - + - + + + + @@ -3171,7 +10435,7 @@

    7 Severity Levels

    - @@ -3179,44 +10443,45 @@

    7 Severity Levels

    -
    -

    Accidental Incident

    + + + + + +
    +

    Equipment Malfunction

    Term7SeverityLevelsEquipmentFailure Prefix risk
    Label7 Severity LevelsEquipment Failure
    IRIhttps://w3id.org/dpv/risk#7SeverityLevelshttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Severity + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely LowSomething that acts as or causes Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3225,28 +10490,40 @@

    Accidental Incident

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -3255,30 +10532,33 @@

    Accidental Incident

    -
    -

    Accidental Misuse

    + + + +
    +

    Erroneous System Use

    TermAccidentalIncidentEquipmentMalfunction Prefix risk
    LabelAccidental IncidentEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#AccidentalIncidenthttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:OperationalSecurityRiskdpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situationsSomething that acts as or causes Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -3297,25 +10577,37 @@

    Accidental Misuse

    - + - + + + + - - - + + + + + + + + + + + + - @@ -3324,41 +10616,45 @@

    Accidental Misuse

    -
    -

    Authorisation Failure

    + + + +
    +

    Ethnic Discrimination

    TermAccidentalMisuseErroneousSystemUse Prefix risk
    LabelAccidental MisuseErroneous System Use
    IRIhttps://w3id.org/dpv/risk#AccidentalMisusehttps://w3id.org/dpv/risk#ErroneousSystemUse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    DefinitionAccidental MisuseSomething that acts as or causes Erroneous System Use
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - @@ -3372,37 +10668,28 @@

    Authorisation Failure

    - + - - - - + - + - - - - - - - - + + - @@ -3411,64 +10698,43 @@

    Authorisation Failure

    -
    -

    None

    + + + +
    +

    Excellence Discrimination

    TermAuthorisationFailureEthnicDiscrimination Prefix risk
    LabelAuthorisation FailureEthnic Discrimination
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailurehttps://w3id.org/dpv/risk#EthnicDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Racism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Racism + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Authorisation FailureDiscrimination against individuals based on their ethnicity or cultural heritage
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - @@ -3480,7 +10746,10 @@

    None

    - + + + + @@ -3490,14 +10759,17 @@

    None

    - + + + + - @@ -3505,44 +10777,46 @@

    None

    -
    -

    Availability Incident

    + + + + + + +
    +

    Exposure to Harmful Speech

    TermAvailabilityBreachExcellenceDiscrimination Prefix risk
    LabelNoneExcellence Discrimination
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreachhttps://w3id.org/dpv/risk#ExcellenceDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3551,28 +10825,40 @@

    Availability Incident

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -3581,48 +10867,40 @@

    Availability Incident

    -
    -

    Avoid Source

    + +
    +

    External Security Threat

    TermAvailabilityIncidentExposureToHarmfulSpeech Prefix risk
    LabelAvailability IncidentExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncidenthttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Incident + risk:SocietalRiskdpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affectedSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3631,7 +10909,7 @@

    Avoid Source

    - + @@ -3642,20 +10920,14 @@

    Avoid Source

    - - - - + - - - - + - @@ -3664,35 +10936,40 @@

    Avoid Source

    -
    -

    Benefit

    + + + + +
    +

    Extorsion

    TermAvoidSourceExternalSecurityThreat Prefix risk
    LabelAvoid SourceExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#AvoidSourcehttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSource
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk sourceConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -3706,20 +10983,23 @@

    Benefit

    - + - + + + + - + @@ -3727,13 +11007,13 @@

    Benefit

    - + - @@ -3742,39 +11022,44 @@

    Benefit

    -
    -

    Bias

    +
    +

    Extremely High Likelihood

    TermBenefitExtorsion Prefix risk
    LabelBenefitExtorsion
    IRIhttps://w3id.org/dpv/risk#Benefithttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:FinancialImpact + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes benefitsSomething that acts as or causes Extorsion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-03-232022-08-17
    Date Modified
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel PolleresHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -3783,80 +11068,80 @@

    Bias

    - + - + + + + - - - - + - + - + -
    TermBiasExtremelyHighLikelihood Prefix risk
    LabelBiasExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#Biashttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to othersLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in AI + section RISK-LEVELS in RISK
    - -
    -

    Blackmail

    +
    +

    Extremely High Risk

    - + - + - + - + - - - - + + + + @@ -3865,28 +11150,25 @@

    Blackmail

    - + - + + + + - - - - + - + - - - - + @@ -3895,7 +11177,7 @@

    Blackmail

    - @@ -3904,46 +11186,44 @@

    Blackmail

    -
    -

    Brute Force Authorisations

    +
    +

    Extremely High Severity

    TermBlackmailExtremelyHighRisk Prefix risk
    LabelBlackmailExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#Blackmailhttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes BlackmailLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - - + + + + @@ -3952,28 +11232,25 @@

    Brute Force Authorisations

    - + - + + + + - - - - + - + - - - - + @@ -3982,7 +11259,7 @@

    Brute Force Authorisations

    - @@ -3991,50 +11268,42 @@

    Brute Force Authorisations

    - - - - -
    -

    Change Consequence

    +
    +

    Extremely Low Likelihood

    TermBruteForceAuthorisationsExtremelyHighSeverity Prefix risk
    LabelBrute Force AuthorisationsExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisationshttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniquesLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -4045,9 +11314,12 @@

    Change Consequence

    - + - + + + + @@ -4058,7 +11330,7 @@

    Change Consequence

    - + @@ -4069,7 +11341,7 @@

    Change Consequence

    - @@ -4078,46 +11350,42 @@

    Change Consequence

    -
    -

    Change Impact

    +
    +

    Extremely Low Risk

    TermChangeConsequenceExtremelyLowLikelihood Prefix risk
    LabelChange ConsequenceExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#ChangeConsequencehttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasLikelihood
    DefinitionControl that changes ConsequenceLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -4128,9 +11396,12 @@

    Change Impact

    - + - + + + + @@ -4141,7 +11412,7 @@

    Change Impact

    - + @@ -4152,7 +11423,7 @@

    Change Impact

    - @@ -4161,43 +11432,44 @@

    Change Impact

    -
    -

    Coercion

    +
    +

    Extremely Low Severity

    TermChangeImpactExtremelyLowRisk Prefix risk
    LabelChange ImpactExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#ChangeImpacthttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionControl that changes ImpactLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - + + + + @@ -4206,28 +11478,25 @@

    Coercion

    - + - + + + + - - - - + - + - - - - + @@ -4236,7 +11505,7 @@

    Coercion

    - @@ -4245,36 +11514,38 @@

    Coercion

    -
    -

    Cognitive Bias

    + + + +
    +

    Financial Impact

    TermCoercionExtremelyLowSeverity Prefix risk
    LabelCoercionExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#Coercionhttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes CoercionLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -4287,34 +11558,25 @@

    Cognitive Bias

    - + - - - - + - - - - + - - - - + - @@ -4323,30 +11585,33 @@

    Cognitive Bias

    -
    -

    Compensation

    + + + +
    +

    Financial Loss

    TermCognitiveBiasFinancialImpact Prefix risk
    LabelCognitive BiasFinancial Impact
    IRIhttps://w3id.org/dpv/risk#CognitiveBiashttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when humans are processing and interpreting informationThings that cause or have the potential to impact financial resources
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in AI + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -4365,20 +11630,23 @@

    Compensation

    - + - + + + + - + @@ -4386,13 +11654,13 @@

    Compensation

    - + - @@ -4401,38 +11669,40 @@

    Compensation

    -
    -

    Component Failure

    + + + + +
    +

    Fraud

    TermCompensationFinancialLoss Prefix risk
    LabelCompensationFinancial Loss
    IRIhttps://w3id.org/dpv/risk#Compensationhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other formsSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-04-142022-08-17
    Date Modified
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -4446,28 +11716,37 @@

    Component Failure

    - + - - - - + - + + + + - - - + + + + + + + + + + + + - @@ -4476,38 +11755,45 @@

    Component Failure

    -
    -

    Component Malfunction

    + + + +
    +

    Gender Discrimination

    TermComponentFailureFraud Prefix risk
    LabelComponent FailureFraud
    IRIhttps://w3id.org/dpv/risk#ComponentFailurehttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Component FailureSomething that acts as or causes Fraud
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -4521,12 +11807,9 @@

    Component Malfunction

    - + - - - - + @@ -4535,14 +11818,17 @@

    Component Malfunction

    - + + + + - @@ -4551,44 +11837,43 @@

    Component Malfunction

    -
    -

    Compromise Account

    + + + +
    +

    Geographic Discrimination

    TermComponentMalfunctionGenderDiscrimination Prefix risk
    LabelComponent MalfunctionGender Discrimination
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunctionhttps://w3id.org/dpv/risk#GenderDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept + risk:Sexism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Component MalfunctionDiscrimination based on a person's gender identity or gender expression
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - @@ -4602,37 +11887,28 @@

    Compromise Account

    - + - - - - + - + - - - - - - - - + + - @@ -4641,39 +11917,40 @@

    Compromise Account

    -
    -

    Compromise Account Credentials

    + + + +
    +

    Group Attribution Bias

    TermCompromiseAccountGeographicDiscrimination Prefix risk
    LabelCompromise AccountGeographic Discrimination
    IRIhttps://w3id.org/dpv/risk#CompromiseAccounthttps://w3id.org/dpv/risk#GeographicDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiserDiscrimination based on a person's geographical origin or residence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -4686,7 +11963,7 @@

    Compromise Account Credentials

    - + @@ -4695,28 +11972,25 @@

    Compromise Account Credentials

    - + - + - - - - + - + - @@ -4725,69 +11999,48 @@

    Compromise Account Credentials

    -
    -

    Confidentiality Breach

    +
    +

    Halt Source

    TermCompromiseAccountCredentialsGroupAttributionBias Prefix risk
    LabelCompromise Account CredentialsGroup Attribution Bias
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentialshttps://w3id.org/dpv/risk#GroupAttributionBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Account Credentials to be compromisedBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - - - + + + + @@ -4796,28 +12049,22 @@

    Confidentiality Breach

    - + - - - - + - + - - - - + @@ -4826,7 +12073,7 @@

    Confidentiality Breach

    - @@ -4834,54 +12081,51 @@

    Confidentiality Breach

    -
    -

    Confidentiality Incident

    + + + + +
    +

    Harassment

    TermConfidentialityBreachHaltSource Prefix risk
    LabelConfidentiality BreachHalt Source
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreachhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Confidentiality BreachControl that halts the risk source or prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - - - - + @@ -4891,17 +12135,14 @@

    Confidentiality Incident

    - - - - + - @@ -4910,37 +12151,38 @@

    Confidentiality Incident

    -
    -

    Confirmation Bias

    + + + +
    +

    Harm

    TermConfidentialityIncidentHarassment Prefix risk
    LabelConfidentiality IncidentHarassment
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncidenthttps://w3id.org/dpv/risk#Harassment
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -4953,34 +12195,37 @@

    Confirmation Bias

    - + - + + + + - - - - + - + - + + + + - + - @@ -4989,42 +12234,62 @@

    Confirmation Bias

    -
    -

    Confounding Variables Bias

    + + + + + + + + + + +
    +

    High Likelihood

    TermConfirmationBiasHarm Prefix risk
    LabelConfirmation BiasHarm
    IRIhttps://w3id.org/dpv/risk#ConfirmationBiashttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:IndividualRisk
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of informationSomething that acts as or causes Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    Source
    Date Created2024-09-132022-08-13
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - + + + + @@ -5033,34 +12298,34 @@

    Confounding Variables Bias

    - + - + + + + - - - - + - + - + - @@ -5069,45 +12334,50 @@

    Confounding Variables Bias

    -
    -

    Consequence Control

    +
    +

    High Risk

    TermConfoundingVariablesBiasHighLikelihood Prefix risk
    LabelConfounding Variables BiasHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBiashttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious associationLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -5118,9 +12388,12 @@

    Consequence Control

    - + - + + + + @@ -5131,7 +12404,7 @@

    Consequence Control

    - + @@ -5142,7 +12415,7 @@

    Consequence Control

    - @@ -5151,45 +12424,50 @@

    Consequence Control

    -
    -

    Containment Control

    +
    +

    High Severity

    TermConsequenceControlHighRisk Prefix risk
    LabelConsequence ControlHigh Risk
    IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionRisk Mitigation Measure that controls the ConsequencesLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -5200,9 +12478,12 @@

    Containment Control

    - + - + + + + @@ -5213,15 +12494,18 @@

    Containment Control

    - + - + + + + - @@ -5230,35 +12514,45 @@

    Containment Control

    -
    -

    Copyright Violation

    + + + +
    +

    Homophobia

    TermContainmentControlHighSeverity Prefix risk
    LabelContainment ControlHigh Severity
    IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionControl to contain eventLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + @@ -5272,80 +12566,69 @@

    Copyright Violation

    - + - - - - + - + - - - - - - - - + + -
    TermCopyrightViolationHomophobia Prefix risk
    LabelCopyright ViolationHomophobia
    IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#Homophobia
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Copyright ViolationHostility or prejudice against individuals who are or are perceived to be homosexual
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - - -
    -

    Coverage Bias

    + + + +
    +

    Human Errors

    - + - + - + - + - @@ -5358,7 +12641,7 @@

    Coverage Bias

    - + @@ -5367,25 +12650,28 @@

    Coverage Bias

    - + - + - + + + + - + - @@ -5393,42 +12679,46 @@

    Coverage Bias

    -
    -

    Cross-Border Incident

    + +
    +

    Identification Control

    TermCoverageBiasHumanErrors Prefix risk
    LabelCoverage BiasHuman Errors
    IRIhttps://w3id.org/dpv/risk#CoverageBiashttps://w3id.org/dpv/risk#HumanErrors
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:UserRisks + → dpv:RiskConcept
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being usedSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -5439,7 +12729,7 @@

    Cross-Border Incident

    - + @@ -5460,7 +12750,7 @@

    Cross-Border Incident

    - @@ -5469,38 +12759,40 @@

    Cross-Border Incident

    -
    -

    Cryptojacking

    + + + + +
    +

    Identity Fraud

    TermCrossBorderIncidentIdentificationControl Prefix risk
    LabelCross-Border IncidentIdentification Control
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionIncident involving cross-border or multiple jurisdictionsControl to identify characteristics of event
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -5514,7 +12806,7 @@

    Cryptojacking

    - + @@ -5523,7 +12815,7 @@

    Cryptojacking

    - + @@ -5544,7 +12836,7 @@

    Cryptojacking

    - @@ -5553,35 +12845,40 @@

    Cryptojacking

    -
    -

    Damage

    + + + + +
    +

    Identity Theft

    TermCryptojackingIdentityFraud Prefix risk
    LabelCryptojackingIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes CryptojackingSomething that acts as or causes Identity Fraud
    SourceENISA Threat Landscape 2021ENISA Threat Taxonomy 2016
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -5595,20 +12892,23 @@

    Damage

    - + - + + + + - + @@ -5622,7 +12922,7 @@

    Damage

    - @@ -5631,37 +12931,38 @@

    Damage

    -
    -

    Data Aggregation Bias

    + + +
    +

    Illegal Data Processing

    TermDamageIdentityTheft Prefix risk
    LabelDamageIdentity Theft
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:LegalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes DamageSomething that acts as or causes Identity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2022-03-302022-08-17
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -5674,34 +12975,40 @@

    Data Aggregation Bias

    - + - + + + + - + - + - + + + + - + - @@ -5710,40 +13017,47 @@

    Data Aggregation Bias

    -
    -

    Data Bias

    +
    +

    Impact Control

    TermDataAggregationBiasIllegalDataProcessing Prefix risk
    LabelData Aggregation BiasIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#DataAggregationBiashttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:LegalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the dataSomething that acts as or causes Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -5752,34 +13066,31 @@

    Data Bias

    - + - - - - + - + - + - @@ -5788,49 +13099,40 @@

    Data Bias

    -
    -

    Data Breach

    + + + +
    +

    Implicit Bias

    TermDataBiasImpactControl Prefix risk
    LabelData BiasImpact Control
    IRIhttps://w3id.org/dpv/risk#DataBiashttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groupsRisk Mitigation Measure that controls Impacts
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - @@ -5843,40 +13145,34 @@

    Data Breach

    - + - - - - + - + - - - - + - + - @@ -5884,44 +13180,43 @@

    Data Breach

    - -
    -

    Data Corruption

    +
    +

    Incident

    TermDataBreachImplicitBias Prefix risk
    LabelData BreachImplicit Bias
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#ImplicitBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Data BreachBias that occurs when a human makes an association or assumption based on their mental models and memories
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - + + + + @@ -5930,26 +13225,26 @@

    Data Corruption

    - + - + + + + - - - - + - + @@ -5957,56 +13252,65 @@

    Data Corruption

    - + -
    TermDataCorruptionIncident Prefix risk
    LabelData CorruptionIncident
    IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes Corruption of DataAn actual or occured event
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0Incident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified
    ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section RISK-CONSEQUENCES in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + - -
    -

    Data Processing Bias

    +
    +

    Incident Assessment Report

    - + - + - + - + - - + + + + @@ -6015,34 +13319,28 @@

    Data Processing Bias

    - + - - - - + - + - - - - + - @@ -6050,42 +13348,45 @@

    Data Processing Bias

    -
    -

    Deliberate Incident

    + +
    +

    Incident Concluded

    TermDataProcessingBiasIncidentAssessmentReport Prefix risk
    LabelData Processing BiasIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#DataProcessingBiashttps://w3id.org/dpv/risk#IncidentAssessmentReport
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any biasA report describing the assessment of an incident in terms of its effects or impacts
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -6096,7 +13397,7 @@

    Deliberate Incident

    - + @@ -6109,15 +13410,18 @@

    Deliberate Incident

    - + - + + + + - @@ -6125,44 +13429,48 @@

    Deliberate Incident

    - -
    -

    Denial of Service Attack (DoS)

    +
    +

    Incident Concluding Report

    TermDeliberateIncidentIncidentConcluded Prefix risk
    LabelDeliberate IncidentIncident Concluded
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#IncidentConcluded
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation risk:hasIncident + dpv:hasContext, + dpv:hasStatus
    DefinitionIncident caused due to deliberate actions of a humanThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - + + + + @@ -6171,37 +13479,28 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + - - - - - - - - + + - @@ -6209,46 +13508,46 @@

    Denial of Service Attack (DoS)

    - -
    -

    Detection Control

    +
    +

    Incident Detection Report

    TermDenialServiceAttackIncidentConcludingReport Prefix risk
    LabelDenial of Service Attack (DoS)Incident Concluding Report
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -6259,7 +13558,7 @@

    Detection Control

    - + @@ -6280,7 +13579,7 @@

    Detection Control

    - @@ -6289,40 +13588,46 @@

    Detection Control

    -
    -

    Detriment

    +
    +

    Incident Halted

    TermDetectionControlIncidentDetectionReport Prefix risk
    LabelDetection ControlIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionControl to detect eventA report describing the detection of a Incident
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -6331,7 +13636,7 @@

    Detriment

    - + @@ -6344,21 +13649,18 @@

    Detriment

    - + - - - - + - + - @@ -6366,41 +13668,48 @@

    Detriment

    - -
    -

    Discrimination

    +
    +

    Incident Handling Report

    TermDetrimentIncidentHalted Prefix risk
    LabelDetrimentIncident Halted
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes DetrimentThe incident has halted or paused with a high likelihood of resuming or recurring
    Date Created2022-03-232024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -6409,7 +13718,7 @@

    Discrimination

    - + @@ -6422,21 +13731,15 @@

    Discrimination

    - + - - - - - - - - + + - @@ -6444,41 +13747,33 @@

    Discrimination

    - -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    Incident Identifier

    TermDiscriminationIncidentHandlingReport Prefix risk
    LabelDiscriminationIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#IncidentHandlingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes DiscriminationA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Date Created2022-08-192024-05-19
    Date Modified2024-08-16
    ContributorsGeorg P. Krog
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -6490,37 +13785,28 @@

    Distributed Denial of Service Attack (DDoS)

    - + - - - - + - + - - - - - - - - + + - @@ -6528,23 +13814,23 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Environmental Incident

    +
    +

    Incident Impact Assessment

    TermDistributedDenialServiceAttackIncidentIdentifier Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)Incident Identifier
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Identifier associated with an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + @@ -6556,14 +13842,21 @@

    Environmental Incident

    - - @@ -6574,7 +13867,7 @@

    Environmental Incident

    - + @@ -6590,7 +13883,10 @@

    Environmental Incident

    - + + + + @@ -6604,39 +13900,46 @@

    Environmental Incident

    -
    -

    Environmental Risk

    +
    +

    Incident Mitigated

    TermEnvironmentalIncidentIncidentImpactAssessment Prefix risk
    LabelEnvironmental IncidentIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Broader/Parent types risk:Incident - → dpv:RiskConcept + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncident caused due to environmental factors outside human controlsAn impact assessment associated with a incident
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - + + + + @@ -6645,7 +13948,7 @@

    Environmental Risk

    - + @@ -6656,14 +13959,20 @@

    Environmental Risk

    - + + + + - + + + + - @@ -6671,44 +13980,45 @@

    Environmental Risk

    - -
    -

    Equipment Failure

    +
    +

    Incident Mitigation Measure

    TermEnvironmentalRiskIncidentMitigated Prefix risk
    LabelEnvironmental RiskIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionRisks and issues that have their origin in environment or can affect the environment at largeThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - + + + + @@ -6717,40 +14027,28 @@

    Equipment Failure

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -6759,43 +14057,46 @@

    Equipment Failure

    -
    -

    Equipment Malfunction

    +
    +

    Incident Near Miss

    TermEquipmentFailureIncidentMitigationMeasure Prefix risk
    LabelEquipment FailureIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
    DefinitionSomething that acts as or causes Equipment FailureA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -6804,31 +14105,22 @@

    Equipment Malfunction

    - + - - - - + - - - - + - + - - - - + @@ -6837,7 +14129,7 @@

    Equipment Malfunction

    - @@ -6845,41 +14137,47 @@

    Equipment Malfunction

    - -
    -

    Erroneous System Use

    +
    +

    Incident Notice

    TermEquipmentMalfunctionIncidentNearMiss Prefix risk
    LabelEquipment MalfunctionIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Equipment MalfunctionThe state where an incident was almost successful in taking place i.e. "it came very close"
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -6888,37 +14186,28 @@

    Erroneous System Use

    - + - - - - + - + - - - - - - - - + + - @@ -6927,42 +14216,46 @@

    Erroneous System Use

    - - -
    -

    Exposure to Harmful Speech

    +
    +

    Incident Ongoing

    TermErroneousSystemUseIncidentNotice Prefix risk
    LabelErroneous System UseIncident Notice
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Erroneous System UseNotice associated with an Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -6971,31 +14264,22 @@

    Exposure to Harmful Speech

    - + - - - - + - - - - + - + - - - - + @@ -7004,7 +14288,7 @@

    Exposure to Harmful Speech

    - @@ -7012,40 +14296,48 @@

    Exposure to Harmful Speech

    - -
    -

    External Security Threat

    +
    +

    Incident Ongoing Report

    TermExposureToHarmfulSpeechIncidentOngoing Prefix risk
    LabelExposure to Harmful SpeechIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Harmful SpeechThe incident is ongoing i.e. still active
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -7054,7 +14346,7 @@

    External Security Threat

    - + @@ -7065,14 +14357,17 @@

    External Security Threat

    - + + + + - @@ -7080,44 +14375,48 @@

    External Security Threat

    - -
    -

    Extorsion

    +
    +

    Incident Preliminary Report

    TermExternalSecurityThreatIncidentOngoingReport Prefix risk
    LabelExternal Security ThreatIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionConcepts associated with security threats that are likely to originate externallyA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -7126,37 +14425,28 @@

    Extorsion

    - + - - - - + - + - - - - - - - - + + - @@ -7164,43 +14454,45 @@

    Extorsion

    - -
    -

    Extremely High Likelihood

    +
    +

    Incident Register

    TermExtorsionIncidentPreliminaryReport Prefix risk
    LabelExtorsionIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes ExtorsionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7211,12 +14503,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -7227,7 +14516,7 @@

    Extremely High Likelihood

    - + @@ -7238,7 +14527,7 @@

    Extremely High Likelihood

    - @@ -7246,43 +14535,45 @@

    Extremely High Likelihood

    - -
    -

    Extremely High Risk

    +
    +

    Incident Report

    TermExtremelyHighLikelihoodIncidentRegister Prefix risk
    LabelExtremely High LikelihoodIncident Register
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Likelihood is Extremely HighA register recording incidentes, their reports, notifications, and other related activities
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7293,12 +14584,9 @@

    Extremely High Risk

    - + - - - - + @@ -7309,18 +14597,15 @@

    Extremely High Risk

    - + - - - - + - @@ -7328,43 +14613,43 @@

    Extremely High Risk

    - -
    -

    Extremely High Severity

    +
    +

    Incident Status

    TermExtremelyHighRiskIncidentReport Prefix risk
    LabelExtremely High RiskIncident Report
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#IncidentReport
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasRiskLevel + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Risk is Extremely HighDocumented information about an incident, its handling, assessments,and notifications
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7375,13 +14660,13 @@

    Extremely High Severity

    - + - - - - + + + + @@ -7391,7 +14676,7 @@

    Extremely High Severity

    - + @@ -7402,7 +14687,7 @@

    Extremely High Severity

    - @@ -7411,42 +14696,44 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    +
    +

    Incident Status Unknown

    TermExtremelyHighSeverityIncidentStatus Prefix risk
    LabelExtremely High SeverityIncident Status
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#IncidentStatus
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:Status + → dpv:Context
    Object of relation dpv:hasSeverity + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Severity is Extremely HighStatus associated with an incident
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in DEX
    - + - + - + - + - - @@ -7457,12 +14744,9 @@

    Extremely Low Likelihood

    - + - - - - + @@ -7473,7 +14757,7 @@

    Extremely Low Likelihood

    - + @@ -7484,7 +14768,7 @@

    Extremely Low Likelihood

    - @@ -7493,42 +14777,44 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    +
    +

    Incident Suspected

    TermExtremelyLowLikelihoodIncidentStatusUnknown Prefix risk
    LabelExtremely Low LikelihoodIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#IncidentStatusUnknown
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasLikelihood + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Likelihood is Extremely LowThe status of a incident is unknown
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -7539,12 +14825,9 @@

    Extremely Low Risk

    - + - - - - + @@ -7555,7 +14838,7 @@

    Extremely Low Risk

    - + @@ -7566,7 +14849,7 @@

    Extremely Low Risk

    - @@ -7574,43 +14857,46 @@

    Extremely Low Risk

    - -
    -

    Extremely Low Severity

    +
    +

    Incident Suspected Report

    TermExtremelyLowRiskIncidentSuspected Prefix risk
    LabelExtremely Low RiskIncident Suspected
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasRiskLevel + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Risk is Extremely LowThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -7621,12 +14907,9 @@

    Extremely Low Severity

    - + - - - - + @@ -7637,18 +14920,15 @@

    Extremely Low Severity

    - + - - - - + - @@ -7657,40 +14937,46 @@

    Extremely Low Severity

    -
    -

    Fee

    +
    +

    Incident Terminated

    TermExtremelyLowSeverityIncidentSuspectedReport Prefix risk
    LabelExtremely Low SeverityIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#IncidentSuspectedReport
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Severity is Extremely LowA report describing the suspicion of an incident in the past or occuring
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -7699,37 +14985,31 @@

    Fee

    - + - - - - + - + - - - - + - + - @@ -7738,35 +15018,44 @@

    Fee

    -
    -

    Financial Impact

    + + + +
    +

    Indirect Discrimination

    TermFeeIncidentTerminated Prefix risk
    LabelFeeIncident Terminated
    IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#IncidentTerminated
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or provides fees e.g. for using a serviceThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    Source
    Date Created2024-04-142024-02-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - + + @@ -7779,7 +15068,7 @@

    Financial Impact

    - + @@ -7790,14 +15079,17 @@

    Financial Impact

    - + + + + - @@ -7806,36 +15098,38 @@

    Financial Impact

    -
    -

    Financial Loss

    + + + +
    +

    Individual Health & Safety

    TermFinancialImpactIndirectDiscrimination Prefix risk
    LabelFinancial ImpactIndirect Discrimination
    IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#IndirectDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionThings that cause or have the potential to impact financial resourcesOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7846,39 +15140,24 @@

    Financial Loss

    - - - - + - - - - + - - - - - - - - - - - - + + + - @@ -7887,40 +15166,35 @@

    Financial Loss

    -
    -

    Fraud

    + + +
    +

    Individual Risk

    TermFinancialLossIndividualHealthSafety Prefix risk
    LabelFinancial LossIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IndividualRisk
    DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -7932,37 +15206,25 @@

    Fraud

    - + - - - - + - - - - - - - - - - - - + + + - @@ -7971,37 +15233,38 @@

    Fraud

    -
    -

    Group Attribution Bias

    + + + +
    +

    Informativeness Bias

    TermFraudIndividualRisk Prefix risk
    LabelFraudIndividual Risk
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes FraudRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8014,7 +15277,7 @@

    Group Attribution Bias

    - + @@ -8035,13 +15298,13 @@

    Group Attribution Bias

    - + - @@ -8050,48 +15313,44 @@

    Group Attribution Bias

    -
    -

    Halt Source

    + + + +
    +

    In-Group Bias

    TermGroupAttributionBiasInformativenessBias Prefix risk
    LabelGroup Attribution BiasInformativeness Bias
    IRIhttps://w3id.org/dpv/risk#GroupAttributionBiashttps://w3id.org/dpv/risk#InformativenessBias
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:EngineeringDecisionBias
    DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that groupBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8100,31 +15359,34 @@

    Halt Source

    - + - + + + + - + - + - @@ -8133,35 +15395,39 @@

    Halt Source

    -
    -

    Harm

    + + + +
    +

    Injury

    TermHaltSourceInGroupBias Prefix risk
    LabelHalt SourceIn-Group Bias
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#InGroupBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialisingBias that occurs when showing partiality to one's own group or own characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8174,23 +15440,23 @@

    Harm

    - + - - - - + - + + + + - + @@ -8204,7 +15470,7 @@

    Harm

    - @@ -8217,72 +15483,50 @@

    Harm

    - - - - - - -
    -

    High Likelihood

    +
    +

    None

    TermHarmInjury Prefix risk
    LabelHarmInjury
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Harm to humansSomething that acts as or causes Injury
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceISO/IEC 27005:2018
    Date Created2022-08-132022-08-17
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + - - - - - - - - + + @@ -8291,20 +15535,14 @@

    High Likelihood

    - - - - + - - - - + - @@ -8312,53 +15550,39 @@

    High Likelihood

    - -
    -

    High Risk

    +
    +

    Integrity Concept

    TermHighLikelihoodIntegrityBreach Prefix risk
    LabelHigh LikelihoodNone
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -8367,11 +15591,11 @@

    High Risk

    - + - + @@ -8383,7 +15607,7 @@

    High Risk

    - + @@ -8394,7 +15618,7 @@

    High Risk

    - @@ -8402,51 +15626,42 @@

    High Risk

    - -
    -

    High Severity

    +
    +

    Integrity Incident

    TermHighRiskIntegrityConcept Prefix risk
    LabelHigh RiskIntegrity Concept
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IntegrityConcept
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2022-08-182024-09-29
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - @@ -8457,12 +15672,9 @@

    High Severity

    - + - - - - + @@ -8473,18 +15685,15 @@

    High Severity

    - + - - - - + - @@ -8493,35 +15702,39 @@

    High Severity

    -
    -

    Human Errors

    + + + +
    +

    Intentional Misuse

    TermHighSeverityIntegrityIncident Prefix risk
    LabelHigh SeverityIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IntegrityIncident
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasSeverity + risk:hasIncident
    DefinitionLevel where Severity is HighIncident where the integrity of information or system has been affected
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - @@ -8535,37 +15748,25 @@

    Human Errors

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8574,47 +15775,45 @@

    Human Errors

    -
    -

    Identification Control

    + + + + +
    +

    Intercept Communications

    TermHumanErrorsIntentionalMisuse Prefix risk
    LabelHuman ErrorsIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UserRisks + risk:Misuse + → risk:UserRisksdpv:RiskConcept
    DefinitionSomething that acts as or causes Human ErrorsIntentional Misuse
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8623,28 +15822,40 @@

    Identification Control

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -8653,38 +15864,43 @@

    Identification Control

    -
    -

    Identity Fraud

    + + + + + + + +
    +

    Judicial Costs

    TermIdentificationControlInterceptCommunications Prefix risk
    LabelIdentification ControlIntercept Communications
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to identify characteristics of eventSomething that acts as or causes Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -8698,37 +15914,25 @@

    Identity Fraud

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8737,38 +15941,39 @@

    Identity Fraud

    -
    -

    Identity Theft

    + + + +
    +

    Judicial Penalty

    TermIdentityFraudJudicialCosts Prefix risk
    LabelIdentity FraudJudicial Costs
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialLoss + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that acts as or causes Identity FraudSomething that involves or causes judicial costs to be paid
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -8782,37 +15987,25 @@

    Identity Theft

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8821,35 +16014,43 @@

    Identity Theft

    -
    -

    Illegal Data Processing

    + + + +
    +

    Language Discrimination

    TermIdentityTheftJudicialPenalty Prefix risk
    LabelIdentity TheftJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialLoss + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that acts as or causes Identity TheftSomething that involves or causes judicial penalties to be paid
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -8863,40 +16064,28 @@

    Illegal Data Processing

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -8905,47 +16094,41 @@

    Illegal Data Processing

    -
    -

    Impact Control

    + + +
    +

    Legal Risk

    TermIllegalDataProcessingLanguageDiscrimination Prefix risk
    LabelIllegal Data ProcessingLanguage Discrimination
    IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#LanguageDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Illegal Processing of DataDiscrimination based on a person's language, often linked to national origin or ethnicity
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8954,7 +16137,7 @@

    Impact Control

    - + @@ -8965,20 +16148,14 @@

    Impact Control

    - - - - + - - - - + - @@ -8987,37 +16164,39 @@

    Impact Control

    -
    -

    Implicit Bias

    + + + +
    +

    Lose of Credibility

    TermImpactControlLegalRisk Prefix risk
    LabelImpact ControlLegal Risk
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#LegalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls ImpactsRisks and issues that have their basis in legal requirements and enforcement
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9030,7 +16209,7 @@

    Implicit Bias

    - + @@ -9039,25 +16218,28 @@

    Implicit Bias

    - + - + - + + + + - + - @@ -9065,43 +16247,44 @@

    Implicit Bias

    -
    -

    Incident

    + + + + +
    +

    Lose of Customer Confidence

    TermImplicitBiasLoseCredibility Prefix risk
    LabelImplicit BiasLose of Credibility
    IRIhttps://w3id.org/dpv/risk#ImplicitBiashttps://w3id.org/dpv/risk#LoseCredibility
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ReputationalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when a human makes an association or assumption based on their mental models and memoriesSomething that acts as or causes Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9110,26 +16293,23 @@

    Incident

    - + - - - - - - - + - + + + + - + @@ -9137,65 +16317,58 @@

    Incident

    - + -
    TermIncidentLoseCustomerConfidence Prefix risk
    LabelIncidentLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionAn actual or occured eventSomething that acts as or causes Loss of Customer Confidence
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
    See More: section CORE in DEX - , section INCIDENT in DEX + section RISK-TAXONOMY in RISK
    - - -
    -

    Incident Assessment Report

    + + + + +
    +

    Lose of Goodwill

    - + - + - + - + - - - - - + @@ -9204,28 +16377,37 @@

    Incident Assessment Report

    - + - + + + + - + - - + + + + + + + + - @@ -9234,46 +16416,43 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    + + + +
    +

    Lose of Negotiating Capacity

    TermIncidentAssessmentReportLoseGoodwill Prefix risk
    LabelIncident Assessment ReportLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsSomething that acts as or causes Loss of Goodwill
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9282,22 +16461,28 @@

    Incident Concluded

    - + - + + + + - + - + + + + @@ -9306,7 +16491,7 @@

    Incident Concluded

    - @@ -9314,48 +16499,44 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + + + + +
    +

    Lose of Opportunity

    TermIncidentConcludedLoseNegotiatingCapacity Prefix risk
    LabelIncident ConcludedLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringSomething that acts as or causes Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9364,28 +16545,37 @@

    Incident Concluding Report

    - + - + + + + - + - - + + + + + + + + - @@ -9393,48 +16583,44 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    + + + + +
    +

    Lose of Reputation

    TermIncidentConcludingReportLoseOpportunity Prefix risk
    LabelIncident Concluding ReportLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#LoseOpportunity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownSomething that acts as or causes Loss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9443,28 +16629,37 @@

    Incident Detection Report

    - + - + + + + - + - - + + + + + + + + - @@ -9473,46 +16668,43 @@

    Incident Detection Report

    -
    -

    Incident Halted

    + + + +
    +

    Lose of Trust

    TermIncidentDetectionReportLoseReputation Prefix risk
    LabelIncident Detection ReportLose of Reputation
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the detection of a IncidentSomething that acts as or causes Loss of Reputation
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9521,22 +16713,28 @@

    Incident Halted

    - + - + + + + - + - + + + + @@ -9545,7 +16743,7 @@

    Incident Halted

    - @@ -9553,46 +16751,51 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + +
    +

    Low Likelihood

    TermIncidentHaltedLoseTrust Prefix risk
    LabelIncident HaltedLose of Trust
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringSomething that acts as or causes Loss of Trust
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -9603,9 +16806,12 @@

    Incident Handling Report

    - + - + + + + @@ -9616,15 +16822,18 @@

    Incident Handling Report

    - + - + + + + - @@ -9632,36 +16841,53 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + +
    +

    Low Risk

    TermIncidentHandlingReportLowLikelihood Prefix risk
    LabelIncident Handling ReportLow Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasLikelihood
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + + + + - + + + + @@ -9670,9 +16896,12 @@

    Incident Identifier

    - + - + + + + @@ -9683,15 +16912,18 @@

    Incident Identifier

    - + - + + + + - @@ -9699,49 +16931,51 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + +
    +

    Low Severity

    TermIncidentIdentifierLowRisk Prefix risk
    LabelIncident IdentifierLow Risk
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionIdentifier associated with an incidentLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -9752,9 +16986,12 @@

    Incident Impact Assessment

    - + - + + + + @@ -9765,7 +17002,7 @@

    Incident Impact Assessment

    - + @@ -9776,7 +17013,7 @@

    Incident Impact Assessment

    - @@ -9785,46 +17022,43 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    + + + +
    +

    Malicious Activity

    TermIncidentImpactAssessmentLowSeverity Prefix risk
    LabelIncident Impact AssessmentLow Severity
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionAn impact assessment associated with a incidentLevel where Severity is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -9833,7 +17067,7 @@

    Incident Mitigated

    - + @@ -9844,20 +17078,14 @@

    Incident Mitigated

    - - - - + - - - - + - @@ -9865,45 +17093,47 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + + + + + + +
    +

    Malicious Code Attack

    TermIncidentMitigatedMaliciousActivity Prefix risk
    LabelIncident MitigatedMalicious Activity
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#MaliciousActivity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9912,28 +17142,37 @@

    Incident Mitigation Measure

    - + - + + + + - + - - + + + + + + + + - @@ -9942,46 +17181,46 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + + + +
    +

    Malware Attack

    TermIncidentMitigationMeasureMaliciousCodeAttack Prefix risk
    LabelIncident Mitigation MeasureMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againSomething that acts as or causes Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9990,22 +17229,28 @@

    Incident Near Miss

    - + - + + + + - + - + + + + @@ -10014,7 +17259,7 @@

    Incident Near Miss

    - @@ -10022,47 +17267,44 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + + + + +
    +

    Material Damage

    TermIncidentNearMissMalwareAttack Prefix risk
    LabelIncident Near MissMalware Attack
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Something that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - + + + @@ -10071,9 +17313,12 @@

    Incident Notice

    - + - + + + + @@ -10084,15 +17329,21 @@

    Incident Notice

    - + - - + + + + + + + + - @@ -10101,46 +17352,50 @@

    Incident Notice

    -
    -

    Incident Ongoing

    + + + +
    +

    Misandry

    TermIncidentNoticeMaterialDamage Prefix risk
    LabelIncident NoticeMaterial Damage
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#MaterialDamage
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an IncidentSomething that acts as or causes Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -10149,7 +17404,7 @@

    Incident Ongoing

    - + @@ -10162,18 +17417,15 @@

    Incident Ongoing

    - + - - - - + - @@ -10181,48 +17433,51 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    + + + + +
    +

    Misogyny

    TermIncidentOngoingMisandry Prefix risk
    LabelIncident OngoingMisandry
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#Misandry
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident is ongoing i.e. still activeDislike, contempt, or prejudice against men
    Date Created2024-02-142024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -10231,7 +17486,7 @@

    Incident Ongoing Report

    - + @@ -10244,7 +17499,7 @@

    Incident Ongoing Report

    - + @@ -10252,7 +17507,7 @@

    Incident Ongoing Report

    - @@ -10260,48 +17515,44 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + + + + +
    +

    Misuse

    TermIncidentOngoingReportMisogyny Prefix risk
    LabelIncident Ongoing ReportMisogyny
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#Misogyny
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedDislike, contempt, or prejudice against women
    Date Created2024-05-192024-09-30
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -10310,7 +17561,7 @@

    Incident Preliminary Report

    - + @@ -10323,15 +17574,21 @@

    Incident Preliminary Report

    - + - - + + + + + + + + - @@ -10339,45 +17596,51 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + +
    +

    Moderate Likelihood

    TermIncidentPreliminaryReportMisuse Prefix risk
    LabelIncident Preliminary ReportMisuse
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownSomething that acts as or causes Misuse
    Date Created2024-05-192024-06-11
    Date Modified2024-08-16
    ContributorsDelaram Golpayegani
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -10388,9 +17651,12 @@

    Incident Register

    - + - + + + + @@ -10401,7 +17667,7 @@

    Incident Register

    - + @@ -10412,7 +17678,7 @@

    Incident Register

    - @@ -10420,45 +17686,51 @@

    Incident Register

    -
    -

    Incident Report

    + +
    +

    Moderate Risk

    TermIncidentRegisterModerateLikelihood Prefix risk
    LabelIncident RegisterModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasLikelihood
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -10469,9 +17741,12 @@

    Incident Report

    - + - + + + + @@ -10482,15 +17757,18 @@

    Incident Report

    - + - + + + + - @@ -10498,43 +17776,51 @@

    Incident Report

    -
    -

    Incident Status

    + +
    +

    Moderate Severity

    TermIncidentReportModerateRisk Prefix risk
    LabelIncident ReportModerate Risk
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -10545,13 +17831,13 @@

    Incident Status

    - + + + + + - - - - @@ -10561,7 +17847,7 @@

    Incident Status

    - + @@ -10572,7 +17858,7 @@

    Incident Status

    - @@ -10581,44 +17867,46 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Monitor Consequence

    TermIncidentStatusModerateSeverity Prefix risk
    LabelIncident StatusModerate Severity
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Status - → dpv:Context + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasSeverity
    DefinitionStatus associated with an incidentLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in DEX + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -10629,7 +17917,7 @@

    Incident Status Unknown

    - + @@ -10642,7 +17930,7 @@

    Incident Status Unknown

    - + @@ -10653,7 +17941,7 @@

    Incident Status Unknown

    - @@ -10662,44 +17950,45 @@

    Incident Status Unknown

    -
    -

    Incident Suspected

    +
    +

    Monitor Control

    TermIncidentStatusUnknownMonitorConsequence Prefix risk
    LabelIncident Status UnknownMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe status of a incident is unknownControl that monitors a Risk Consequence
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10710,9 +17999,12 @@

    Incident Suspected

    - + - + + + + @@ -10723,7 +18015,7 @@

    Incident Suspected

    - + @@ -10734,7 +18026,7 @@

    Incident Suspected

    - @@ -10742,46 +18034,47 @@

    Incident Suspected

    -
    -

    Incident Suspected Report

    + +
    +

    Monitor Impact

    TermIncidentSuspectedMonitorControl Prefix risk
    LabelIncident SuspectedMonitor Control
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10792,7 +18085,7 @@

    Incident Suspected Report

    - + @@ -10808,12 +18101,15 @@

    Incident Suspected Report

    - + + + + - @@ -10822,44 +18118,46 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    +
    +

    Monitor Risk

    TermIncidentSuspectedReportMonitorImpact Prefix risk
    LabelIncident Suspected ReportMonitor Impact
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA report describing the suspicion of an incident in the past or occuringControl that monitors a Risk Impact
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10870,7 +18168,7 @@

    Incident Terminated

    - + @@ -10883,7 +18181,7 @@

    Incident Terminated

    - + @@ -10894,7 +18192,7 @@

    Incident Terminated

    - @@ -10903,46 +18201,58 @@

    Incident Terminated

    -
    -

    Individual Health & Safety

    +
    +

    Monitor Control

    TermIncidentTerminatedMonitorRisk Prefix risk
    LabelIncident TerminatedMonitor Risk
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringControl that monitors a Risk
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + - + + + + @@ -10952,14 +18262,20 @@

    Individual Health & Safety

    - + + + + - + + + + - @@ -10967,36 +18283,49 @@

    Individual Health & Safety

    -
    -

    Individual Risk

    + +
    +

    Monitor Risk Source

    TermIndividualHealthSafetyMonitorRiskControl Prefix risk
    LabelIndividual Health & SafetyMonitor Control
    IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IndividualRisk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that monitors another Control
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + + - + + + + @@ -11005,7 +18334,7 @@

    Individual Risk

    - + @@ -11016,14 +18345,20 @@

    Individual Risk

    - + + + + - + + + + - @@ -11032,39 +18367,48 @@

    Individual Risk

    -
    -

    Informativeness Bias

    +
    +

    Monitor Vulnerabilities

    TermIndividualRiskMonitorRiskSource Prefix risk
    LabelIndividual RiskMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionRisks and issues that affect or have the potential to affect specific individualsControl that monitors a Risk Source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -11073,34 +18417,31 @@

    Informativeness Bias

    - + - - - - + - + - + - @@ -11109,37 +18450,44 @@

    Informativeness Bias

    -
    -

    In-Group Bias

    + + + +
    +

    Nationality Discrimination

    TermInformativenessBiasMonitorVulnerabilities Prefix risk
    LabelInformativeness BiasMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#InformativenessBiashttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:EngineeringDecisionBias + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some groupControl that monitors a Risk Vulnerability
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + @@ -11152,34 +18500,28 @@

    In-Group Bias

    - + - - - - + - + - - - - + - @@ -11188,35 +18530,39 @@

    In-Group Bias

    -
    -

    Injury

    + + + +
    +

    Non-Material Damage

    TermInGroupBiasNationalityDiscrimination Prefix risk
    LabelIn-Group BiasNationality Discrimination
    IRIhttps://w3id.org/dpv/risk#InGroupBiashttps://w3id.org/dpv/risk#NationalityDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias + Broader/Parent types risk:Discriminationrisk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when showing partiality to one's own group or own characteristicsDiscrimination based on a person's nationality or citizenship
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11229,23 +18575,23 @@

    Injury

    - + - + + + + - - - - + - + @@ -11259,7 +18605,7 @@

    Injury

    - @@ -11268,65 +18614,41 @@

    Injury

    -
    -

    None

    + + + +
    +

    Non-Normality Bias

    TermInjuryNonMaterialDamage Prefix risk
    LabelInjuryNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:LegalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes InjurySomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - - @@ -11337,24 +18659,36 @@

    None

    - + + + + - + + + + - + + + + - + + + + - @@ -11362,44 +18696,47 @@

    None

    -
    -

    Integrity Incident

    + + + + +
    +

    Non-Response Bias

    TermIntegrityBreachNonNormalityBias Prefix risk
    LabelNoneNon-Normality Bias
    IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#NonNormalityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11408,28 +18745,34 @@

    Integrity Incident

    - + - + + + + - + - + + + + - @@ -11438,36 +18781,37 @@

    Integrity Incident

    -
    -

    Intentional Misuse

    + + +
    +

    Operational Security Risk

    TermIntegrityIncidentNonResponseBias Prefix risk
    LabelIntegrity IncidentNon-Response Bias
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#NonResponseBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the integrity of information or system has been affectedBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11480,7 +18824,7 @@

    Intentional Misuse

    - + @@ -11498,7 +18842,7 @@

    Intentional Misuse

    - @@ -11507,39 +18851,40 @@

    Intentional Misuse

    -
    -

    Intercept Communications

    + + + +
    +

    Out-Group Homogeneity Bias

    TermIntentionalMisuseOperationalSecurityRisk Prefix risk
    LabelIntentional MisuseOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionIntentional MisuseRisks and issues that arise during operational processes
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -11552,40 +18897,34 @@

    Intercept Communications

    - + - - - - + - + - + - - - - + - + - @@ -11597,36 +18936,36 @@

    Intercept Communications

    - -
    -

    Judicial Costs

    +
    +

    Payment

    TermInterceptCommunicationsOutGroupHomogeneityBias Prefix risk
    LabelIntercept CommunicationsOut-Group Homogeneity Bias
    IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Interception of CommunicationsBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11640,7 +18979,7 @@

    Judicial Costs

    - + @@ -11651,14 +18990,23 @@

    Judicial Costs

    - - - + + + + + + + + + + + + - @@ -11667,35 +19015,38 @@

    Judicial Costs

    -
    -

    Judicial Penalty

    + + + +
    +

    Personal Safety Endangerment

    TermJudicialCostsPayment Prefix risk
    LabelJudicial CostsPayment
    IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:Renumeration + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that involves or causes judicial costs to be paidSomething that acts as or provides payment e.g. to access a service or purchase resources
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11709,25 +19060,37 @@

    Judicial Penalty

    - + - - - - + + + + - + + + + + + + + + + + + + - @@ -11736,35 +19099,41 @@

    Judicial Penalty

    -
    -

    Legal Risk

    + + + + +
    +

    Phishing Scam

    TermJudicialPenaltyPersonalSafetyEndangerment Prefix risk
    LabelJudicial PenaltyPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that involves or causes judicial penalties to be paidSomething that acts as or causes Personal Safety Endangerment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11777,25 +19146,37 @@

    Legal Risk

    - + - + + + + - - - + + + + + + + + + + + + - @@ -11804,36 +19185,39 @@

    Legal Risk

    -
    -

    Lose of Credibility

    + + + +
    +

    Physical Assault

    TermLegalRiskPhishingScam Prefix risk
    LabelLegal RiskPhishing Scam
    IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionRisks and issues that have their basis in legal requirements and enforcementSomething that acts as or causes Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11846,7 +19230,7 @@

    Lose of Credibility

    - + @@ -11876,7 +19260,7 @@

    Lose of Credibility

    - @@ -11885,36 +19269,39 @@

    Lose of Credibility

    -
    -

    Lose of Customer Confidence

    + + + +
    +

    Physical Harm

    TermLoseCredibilityPhysicalAssault Prefix risk
    LabelLose of CredibilityPhysical Assault
    IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of CredibilitySomething that acts as or causes Physical Assault
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11925,39 +19312,24 @@

    Lose of Customer Confidence

    - - - - + - - - - + - - - - - - - - - - - - + + + - @@ -11965,37 +19337,35 @@

    Lose of Customer Confidence

    - -
    -

    Lose of Goodwill

    +
    +

    Potential Consequence

    TermLoseCustomerConfidencePhysicalHarm Prefix risk
    LabelLose of Customer ConfidencePhysical Harm
    IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -12008,28 +19378,25 @@

    Lose of Goodwill

    - + - + + + + - - - - + - + - - - - + @@ -12038,7 +19405,7 @@

    Lose of Goodwill

    - @@ -12046,37 +19413,35 @@

    Lose of Goodwill

    - -
    -

    Lose of Negotiating Capacity

    +
    +

    Potential Impact

    TermLoseGoodwillPotentialConsequence Prefix risk
    LabelLose of GoodwillPotential Consequence
    IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#PotentialConsequence
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of GoodwillIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12089,28 +19454,25 @@

    Lose of Negotiating Capacity

    - + - + + + + - - - - + - + - - - - + @@ -12119,7 +19481,7 @@

    Lose of Negotiating Capacity

    - @@ -12127,37 +19489,35 @@

    Lose of Negotiating Capacity

    - -
    -

    Lose of Opportunity

    +
    +

    Potential Risk

    TermLoseNegotiatingCapacityPotentialImpact Prefix risk
    LabelLose of Negotiating CapacityPotential Impact
    IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#PotentialImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Negotiating CapacityIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12170,28 +19530,25 @@

    Lose of Opportunity

    - + - + + + + - - - - + - + - - - - + @@ -12200,7 +19557,7 @@

    Lose of Opportunity

    - @@ -12208,37 +19565,35 @@

    Lose of Opportunity

    - -
    -

    Lose of Reputation

    +
    +

    Potential RiskSource

    TermLoseOpportunityPotentialRisk Prefix risk
    LabelLose of OpportunityPotential Risk
    IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#PotentialRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of OpportunityIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12251,28 +19606,25 @@

    Lose of Reputation

    - + - + + + + - - - - + - + - - - - + @@ -12281,7 +19633,7 @@

    Lose of Reputation

    - @@ -12290,36 +19642,38 @@

    Lose of Reputation

    -
    -

    Lose of Trust

    + + + +
    +

    Privacy

    TermLoseReputationPotentialRiskSource Prefix risk
    LabelLose of ReputationPotential RiskSource
    IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#PotentialRiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of ReputationIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12330,39 +19684,24 @@

    Lose of Trust

    - - - - + - - - - + - - - - - - - - - - - - - + + + + - @@ -12371,52 +19710,43 @@

    Lose of Trust

    -
    -

    Low Likelihood

    + + + +
    +

    Psychological Harm

    TermLoseTrustPrivacy Prefix risk
    LabelLose of TrustPrivacy
    IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#Privacy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of Trust
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -12425,25 +19755,28 @@

    Low Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -12452,7 +19785,7 @@

    Low Likelihood

    - @@ -12461,52 +19794,42 @@

    Low Likelihood

    -
    -

    Low Risk

    + + +
    +

    Public Order Breach

    TermLowLikelihoodPsychologicalHarm Prefix risk
    LabelLow LikelihoodPsychological Harm
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#PsychologicalHarm
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:Harm + → risk:IndividualRisk
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is LowSomething that acts as or causes Psychological Harm
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -12515,25 +19838,28 @@

    Low Risk

    - + - - - - + - + + + + - + - + + + + @@ -12542,7 +19868,7 @@

    Low Risk

    - @@ -12551,52 +19877,50 @@

    Low Risk

    -
    -

    Low Severity

    + + + +
    +

    Racial Discrimination

    TermLowRiskPublicOrderBreach Prefix risk
    LabelLow RiskPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is LowSomething that acts as or causes Public Order Breach
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + @@ -12605,12 +19929,9 @@

    Low Severity

    - + - - - - + @@ -12621,18 +19942,15 @@

    Low Severity

    - + - - - - + - @@ -12641,45 +19959,44 @@

    Low Severity

    -
    -

    Malicious Code Attack

    + + + +
    +

    Racism

    TermLowSeverityRacialDiscrimination Prefix risk
    LabelLow SeverityRacial Discrimination
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#RacialDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:Racism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Racism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is LowDiscrimination against individuals because of their racial background or skin color
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - @@ -12692,37 +20009,28 @@

    Malicious Code Attack

    - + - - - - + - + - - - - - - - - + + - @@ -12731,49 +20039,47 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    +
    +

    Recovery Control

    TermMaliciousCodeAttackRacism Prefix risk
    LabelMalicious Code AttackRacism
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#Racism
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:ExternalSecurityThreat + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes Malicious Code AttackPrejudice or discrimination against people based on their race
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + + + + @@ -12782,37 +20088,28 @@

    Malware Attack

    - + - - - - + - + - - - - - - - - + + - @@ -12821,40 +20118,48 @@

    Malware Attack

    -
    -

    Material Damage

    +
    +

    Reduce Likelihood

    TermMalwareAttackRecoveryControl Prefix risk
    LabelMalware AttackRecovery Control
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#RecoveryControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malware AttackControl to recover from event
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -12863,12 +20168,9 @@

    Material Damage

    - + - - - - + @@ -12879,12 +20181,9 @@

    Material Damage

    - + - - - - + @@ -12893,7 +20192,7 @@

    Material Damage

    - @@ -12902,40 +20201,48 @@

    Material Damage

    -
    -

    Misuse

    +
    +

    Reduce Severity

    TermMaterialDamageReduceLikelihood Prefix risk
    LabelMaterial DamageReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Material DamageControl that reduces the likelihood of an event
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -12944,7 +20251,7 @@

    Misuse

    - + @@ -12957,21 +20264,18 @@

    Misuse

    - + - - - - + - + - @@ -12980,50 +20284,45 @@

    Misuse

    -
    -

    Moderate Likelihood

    +
    +

    Reduction Control

    TermMisuseReduceSeverity Prefix risk
    LabelMisuseReduce Severity
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#ReduceSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes MisuseControl that reduces the severity of an event
    Date Created2024-06-112024-05-19
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -13034,12 +20333,9 @@

    Moderate Likelihood

    - + - - - - + @@ -13050,18 +20346,15 @@

    Moderate Likelihood

    - + - - - - + - @@ -13070,52 +20363,46 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    + + + + + + +
    +

    Re-identification

    TermModerateLikelihoodReductionControl Prefix risk
    LabelModerate LikelihoodReduction Control
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#ReductionControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is ModerateControl that reduces the likelihood or severity of an event
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + @@ -13124,11 +20411,11 @@

    Moderate Risk

    - + - + @@ -13140,9 +20427,12 @@

    Moderate Risk

    - + - + + + + @@ -13151,7 +20441,7 @@

    Moderate Risk

    - @@ -13160,52 +20450,48 @@

    Moderate Risk

    -
    -

    Moderate Severity

    + + + +
    +

    Religious Discrimination

    TermModerateRiskReidentification Prefix risk
    LabelModerate RiskRe-identification
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateSomething that acts as or causes Re-identification
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-182022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + @@ -13214,12 +20500,9 @@

    Moderate Severity

    - + - - - - + @@ -13230,18 +20513,15 @@

    Moderate Severity

    - + - - - - + - @@ -13250,23 +20530,23 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    +
    +

    Remedy Control

    TermModerateSeverityReligiousDiscrimination Prefix risk
    LabelModerate SeverityReligious Discrimination
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#ReligiousDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is ModerateDiscrimination based on a person's religious beliefs or practices
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -13278,8 +20558,7 @@

    Monitor Consequence

    - @@ -13300,7 +20579,7 @@

    Monitor Consequence

    - + @@ -13316,10 +20595,7 @@

    Monitor Consequence

    - - - - + @@ -13333,23 +20609,23 @@

    Monitor Consequence

    -
    -

    Monitor Control

    +
    +

    Remove Consequence

    TermMonitorConsequenceRemedyControl Prefix risk
    LabelMonitor ConsequenceRemedy Control
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#RemedyControl
    Broader/Parent types risk:MonitorControl - → risk:RiskControl + risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionControl that monitors a Risk ConsequenceControl to remedy consequences of event
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -13361,7 +20637,8 @@

    Monitor Control

    - @@ -13382,12 +20659,9 @@

    Monitor Control

    - + - - - - + @@ -13418,23 +20692,23 @@

    Monitor Control

    -
    -

    Monitor Impact

    +
    +

    Remove Impact

    TermMonitorControlRemoveConsequence Prefix risk
    LabelMonitor ControlRemove Consequence
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#RemoveConsequence
    Broader/Parent types risk:RiskControl + risk:ConsequenceControl + → risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsControl that removes Consequence i.e. prevents it from materialising
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    - + - + - + @@ -13446,7 +20720,7 @@

    Monitor Impact

    - - + @@ -13501,23 +20775,23 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Remove Source

    TermMonitorImpactRemoveImpact Prefix risk
    LabelMonitor ImpactRemove Impact
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#RemoveImpact
    Broader/Parent types risk:MonitorControl + risk:ImpactControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13468,7 +20742,7 @@

    Monitor Impact

    DefinitionControl that monitors a Risk ImpactControl that removes Impact i.e. prevents it from materialising
    - + - + - + @@ -13529,7 +20803,7 @@

    Monitor Risk

    - - + @@ -13584,48 +20858,43 @@

    Monitor Risk

    -
    -

    Monitor Control

    + + + +
    +

    Remuneration

    TermMonitorRiskRemoveSource Prefix risk
    LabelMonitor RiskRemove Source
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#RemoveSource
    Broader/Parent types risk:MonitorControl + risk:SourceControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13551,7 +20825,7 @@

    Monitor Risk

    DefinitionControl that monitors a RiskControl that removes the risk source
    - + - + - + - + - - - - - + @@ -13634,7 +20903,7 @@

    Monitor Control

    - + @@ -13647,18 +20916,21 @@

    Monitor Control

    - + - + + + + - + - @@ -13667,48 +20939,42 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    + + + +
    +

    Reputational Risk

    TermMonitorRiskControlRenumeration Prefix risk
    LabelMonitor ControlRemuneration
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlSomething that acts as or provides renumeration which is in monetary or financial form
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13717,7 +20983,7 @@

    Monitor Risk Source

    - + @@ -13728,20 +20994,14 @@

    Monitor Risk Source

    - - - - + - - - - + - @@ -13750,48 +21010,44 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    + + + +
    +

    Requirements Bias

    TermMonitorRiskSourceReputationalRisk Prefix risk
    LabelMonitor Risk SourceReputational Risk
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceRisks and issues that affect the reputation of the organisation
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13800,31 +21056,37 @@

    Monitor Vulnerabilities

    - + - + + + + - + + + + - + - + - @@ -13833,35 +21095,43 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    + + + +
    +

    Reverse Discrimination

    TermMonitorVulnerabilitiesRequirementsBias Prefix risk
    LabelMonitor VulnerabilitiesRequirements Bias
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#RequirementsBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk VulnerabilityBias that occurs in or during requirements creation
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -13875,12 +21145,9 @@

    Non-Material Damage

    - + - - - - + @@ -13891,21 +21158,15 @@

    Non-Material Damage

    - + - - - - - - - - + + - @@ -13914,38 +21175,40 @@

    Non-Material Damage

    -
    -

    Non-Normality Bias

    + + + +
    +

    Reward

    TermNonMaterialDamageReverseDiscrimination Prefix risk
    LabelNon-Material DamageReverse Discrimination
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#ReverseDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -13958,34 +21221,34 @@

    Non-Normality Bias

    - + - - - - + - + - + + + + - + - @@ -13994,39 +21257,40 @@

    Non-Normality Bias

    -
    -

    Non-Response Bias

    + + + +
    +

    Erosion of Rights

    TermNonNormalityBiasReward Prefix risk
    LabelNon-Normality BiasReward
    IRIhttps://w3id.org/dpv/risk#NonNormalityBiashttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleadingSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Source
    Date Created2024-09-132024-04-14
    Date Modified2024-08-16
    ContributorsDaniel DohertyGeorg P. Krog, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14039,34 +21303,28 @@

    Non-Response Bias

    - + - + + + + - - - - + - - - - + - - - - + - @@ -14075,35 +21333,40 @@

    Non-Response Bias

    -
    -

    Operational Security Risk

    + + + +
    +

    Obstruction of Rights

    TermNonResponseBiasRightEroded Prefix risk
    LabelNon-Response BiasErosion of Rights
    IRIhttps://w3id.org/dpv/risk#NonResponseBiashttps://w3id.org/dpv/risk#RightEroded
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation biasThe gradual weakening or reduction of the scope and protection of rights
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14116,9 +21379,12 @@

    Operational Security Risk

    - + - + + + + @@ -14134,7 +21400,7 @@

    Operational Security Risk

    - @@ -14143,37 +21409,40 @@

    Operational Security Risk

    -
    -

    Out-Group Homogeneity Bias

    + + + +
    +

    Denial of Rights

    TermOperationalSecurityRiskRightObstructed Prefix risk
    LabelOperational Security RiskObstruction of Rights
    IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#RightObstructed
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionRisks and issues that arise during operational processesInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14186,34 +21455,28 @@

    Out-Group Homogeneity Bias

    - + - + + + + - - - - + - - - - + - - - - + - @@ -14222,35 +21485,39 @@

    Out-Group Homogeneity Bias

    -
    -

    Payment

    + + + +
    +

    Prevent Exercising of Rights

    TermOutGroupHomogeneityBiasRightsDenial Prefix risk
    LabelOut-Group Homogeneity BiasDenial of Rights
    IRIhttps://w3id.org/dpv/risk#OutGroupHomogeneityBiashttps://w3id.org/dpv/risk#RightsDenial
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristicsThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14264,9 +21531,12 @@

    Payment

    - + - + + + + @@ -14277,7 +21547,7 @@

    Payment

    - + @@ -14291,7 +21561,7 @@

    Payment

    - @@ -14300,30 +21570,33 @@

    Payment

    -
    -

    Personal Safety Endangerment

    + + + +
    +

    Impact to Rights

    TermPaymentRightsExercisePrevention Prefix risk
    LabelPaymentPrevent Exercising of Rights
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#RightsExercisePrevention
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:RightsImpact + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-04-142022-08-18
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -14342,9 +21615,12 @@

    Personal Safety Endangerment

    - + - + + + + @@ -14372,7 +21648,7 @@

    Personal Safety Endangerment

    - @@ -14381,38 +21657,39 @@

    Personal Safety Endangerment

    -
    -

    Phishing Scam

    + + + +
    +

    Limitation of Rights

    TermPersonalSafetyEndangermentRightsImpact Prefix risk
    LabelPersonal Safety EndangermentImpact to Rights
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    DefinitionSomething that acts as or causes Personal Safety EndangermentSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -14426,23 +21703,23 @@

    Phishing Scam

    - + - + + + + - - - - + - + @@ -14450,13 +21727,13 @@

    Phishing Scam

    - + - @@ -14465,35 +21742,40 @@

    Phishing Scam

    -
    -

    Physical Assault

    + + + +
    +

    Unfulfilment of Rights

    TermPhishingScamRightsLimitation Prefix risk
    LabelPhishing ScamLimitation of Rights
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#RightsLimitation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:RightsImpact + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Phishing ScamA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172022-08-18
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14506,37 +21788,28 @@

    Physical Assault

    - + - + + + + - - - - + - - - - - - - - - - - - + + + - @@ -14545,35 +21818,40 @@

    Physical Assault

    -
    -

    Physical Harm

    + + + +
    +

    Violation of Rights

    TermPhysicalAssaultRightsUnfulfilled Prefix risk
    LabelPhysical AssaultUnfulfilment of Rights
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#RightsUnfulfilled
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Physical AssaultFailure to meet or complete the fulfilment of rights
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14584,8 +21862,14 @@

    Physical Harm

    - - + + + + + + + + @@ -14594,51 +21878,64 @@

    Physical Harm

    - - - + + + + + + + + + + + + -
    TermPhysicalHarmRightsViolation Prefix risk
    LabelPhysical HarmViolation of Rights
    IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#RightsViolation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    + + + + - -
    -

    Privacy

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -14649,24 +21946,36 @@

    Privacy

    - + + + + - + + + + - + + + + - + + + + - @@ -14674,36 +21983,35 @@

    Privacy

    - -
    -

    Psychological Harm

    +
    +

    Risk Assessment

    TermPrivacyRiskAnalysis Prefix risk
    LabelPrivacyRisk Analysis
    IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IndividualRisk + risk:RiskAssessment + → risk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -14716,7 +22024,7 @@

    Psychological Harm

    - + @@ -14725,28 +22033,22 @@

    Psychological Harm

    - + - + - - - - - - - - + + - @@ -14754,41 +22056,46 @@

    Psychological Harm

    - -
    -

    Public Order Breach

    +
    +

    Risk Control

    TermPsychologicalHarmRiskAssessment Prefix risk
    LabelPsychological HarmRisk Assessment
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IndividualRisk + risk:RiskManagement
    DefinitionSomething that acts as or causes Psychological HarmAssessment of risk involving its identification, analysis, and evaluation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -14797,37 +22104,31 @@

    Public Order Breach

    - + + + + - - - - + - - - - - - - - - - - + + + + + - @@ -14835,48 +22136,36 @@

    Public Order Breach

    - -
    -

    Recovery Control

    +
    +

    Risk Management

    TermPublicOrderBreachRiskControl Prefix risk
    LabelPublic Order BreachRisk Control
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Public Order BreachControl that modifies risk
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Date Created2024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in DEX
    - + - + - + - + - - - + - - - - + @@ -14885,20 +22174,23 @@

    Recovery Control

    - + - + + + + - + @@ -14906,7 +22198,7 @@

    Recovery Control

    - @@ -14915,48 +22207,40 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Risk Matrix

    TermRecoveryControlRiskManagement Prefix risk
    LabelRecovery ControlRisk Management
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RiskManagement
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to recover from eventSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2024-05-192024-06-12
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -14965,20 +22249,23 @@

    Reduce Likelihood

    - + - + + + + - + @@ -14989,7 +22276,7 @@

    Reduce Likelihood

    - @@ -14998,48 +22285,41 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    +
    +

    Risk Matrix 3x3

    TermReduceLikelihoodRiskMatrix Prefix risk
    LabelReduce LikelihoodRisk Matrix
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood of an eventCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2024-05-192024-02-14
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -15048,7 +22328,7 @@

    Reduce Severity

    - + @@ -15061,7 +22341,7 @@

    Reduce Severity

    - + @@ -15072,7 +22352,7 @@

    Reduce Severity

    - @@ -15081,47 +22361,41 @@

    Reduce Severity

    -
    -

    Reduction Control

    +
    +

    Risk Matrix 5x5

    TermReduceSeverityRiskMatrix3x3 Prefix risk
    LabelReduce SeverityRisk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#RiskMatrix3x3
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an eventA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15130,7 +22404,7 @@

    Reduction Control

    - + @@ -15143,15 +22417,18 @@

    Reduction Control

    - + - + + + + - @@ -15160,41 +22437,37 @@

    Reduction Control

    - - -
    -

    Re-identification

    +
    +

    Risk Matrix 7x7

    TermReductionControlRiskMatrix5x5 Prefix risk
    LabelReduction ControlRisk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#RiskMatrix5x5
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - @@ -15207,12 +22480,9 @@

    Re-identification

    - + - - - - + @@ -15223,12 +22493,9 @@

    Re-identification

    - + - - - - + @@ -15237,7 +22504,7 @@

    Re-identification

    - @@ -15245,46 +22512,41 @@

    Re-identification

    - -
    -

    Remedy Control

    +
    +

    Risk Source

    TermReidentificationRiskMatrix7x7 Prefix risk
    LabelRe-identificationRisk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#RiskMatrix7x7
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Re-identificationA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - @@ -15295,7 +22557,7 @@

    Remedy Control

    - + @@ -15308,15 +22570,18 @@

    Remedy Control

    - + - + + + + - @@ -15325,48 +22590,42 @@

    Remedy Control

    -
    -

    Remove Consequence

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    TermRemedyControlRiskSource Prefix risk
    LabelRemedy ControlRisk Source
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasRiskSource
    DefinitionControl to remedy consequences of eventThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2024-05-192024-02-14
    Date Modified2024-08-16
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -15375,7 +22634,7 @@

    Remove Consequence

    - + @@ -15388,7 +22647,7 @@

    Remove Consequence

    - + @@ -15399,7 +22658,7 @@

    Remove Consequence

    - @@ -15407,49 +22666,43 @@

    Remove Consequence

    - -
    -

    Remove Impact

    + +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRemoveConsequenceRM3x3S1L1 Prefix risk
    LabelRemove ConsequenceLow Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#RM3x3S1L1
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Consequence i.e. prevents it from materialisingNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15458,7 +22711,7 @@

    Remove Impact

    - + @@ -15471,7 +22724,7 @@

    Remove Impact

    - + @@ -15482,7 +22735,7 @@

    Remove Impact

    - @@ -15491,48 +22744,42 @@

    Remove Impact

    -
    -

    Remove Source

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRemoveImpactRM3x3S1L2 Prefix risk
    LabelRemove ImpactLow Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RM3x3S1L2
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Impact i.e. prevents it from materialisingNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15541,7 +22788,7 @@

    Remove Source

    - + @@ -15554,7 +22801,7 @@

    Remove Source

    - + @@ -15565,7 +22812,7 @@

    Remove Source

    - @@ -15574,36 +22821,38 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRemoveSourceRM3x3S1L3 Prefix risk
    LabelRemove SourceModerate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RM3x3S1L3
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15616,7 +22865,7 @@

    Remuneration

    - + @@ -15629,21 +22878,18 @@

    Remuneration

    - + - - - - + - + - @@ -15652,35 +22898,38 @@

    Remuneration

    -
    -

    Reputational Risk

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRenumerationRM3x3S2L1 Prefix risk
    LabelRemunerationLow Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RM3x3S2L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    Date Created2024-04-142022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15693,7 +22942,7 @@

    Reputational Risk

    - + @@ -15704,14 +22953,20 @@

    Reputational Risk

    - + + + + - + + + + - @@ -15720,37 +22975,38 @@

    Reputational Risk

    -
    -

    Requirements Bias

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermReputationalRiskRM3x3S2L2 Prefix risk
    LabelReputational RiskModerate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RM3x3S2L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionRisks and issues that affect the reputation of the organisationNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15763,37 +23019,31 @@

    Requirements Bias

    - + - - - - + - - - - + - + - + - @@ -15802,36 +23052,38 @@

    Requirements Bias

    -
    -

    Reward

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRequirementsBiasRM3x3S2L3 Prefix risk
    LabelRequirements BiasHigh Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RequirementsBiashttps://w3id.org/dpv/risk#RM3x3S2L3
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionBias that occurs in or during requirements creationNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2024-09-132022-08-17
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15844,7 +23096,7 @@

    Reward

    - + @@ -15857,21 +23109,18 @@

    Reward

    - + - - - - + - + - @@ -15880,36 +23129,38 @@

    Reward

    -
    -

    Prevent Exercising of Rights

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRewardRM3x3S3L1 Prefix risk
    LabelRewardModerate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RM3x3S3L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    Date Created2024-04-142022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15922,12 +23173,9 @@

    Prevent Exercising of Rights

    - + - - - - + @@ -15938,21 +23186,18 @@

    Prevent Exercising of Rights

    - + - - - - + - + - @@ -15961,50 +23206,42 @@

    Prevent Exercising of Rights

    -
    -

    Impact to Rights

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRightsExercisePreventionRM3x3S3L2 Prefix risk
    LabelPrevent Exercising of RightsHigh Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RM3x3S3L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Prevent Exercising of RightsNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - + @@ -16013,20 +23250,14 @@

    Impact to Rights

    - + - - - - + - - - - + @@ -16034,10 +23265,7 @@

    Impact to Rights

    - - - - + @@ -16046,7 +23274,7 @@

    Impact to Rights

    - @@ -16055,36 +23283,38 @@

    Impact to Rights

    -
    -

    Limitation of Rights

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRightsImpactRM3x3S3L3 Prefix risk
    LabelImpact to RightsHigh Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RM3x3S3L3
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:Impact - → dpv:Consequence - → dpv:RiskConcept -
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionSomething that acts as or causes Impact to RightsNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16097,12 +23327,9 @@

    Limitation of Rights

    - + - - - - + @@ -16113,21 +23340,18 @@

    Limitation of Rights

    - + - - - - + - + - @@ -16136,36 +23360,38 @@

    Limitation of Rights

    -
    -

    Violation of Rights

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRightsLimitationRM5x5S1L1 Prefix risk
    LabelLimitation of RightsVery Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RM5x5S1L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Limitation of RightsNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16178,12 +23404,9 @@

    Violation of Rights

    - + - - - - + @@ -16194,61 +23417,57 @@

    Violation of Rights

    - + - - - - + - + -
    TermRightsViolationRM5x5S1L2 Prefix risk
    LabelViolation of RightsVery Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RM5x5S1L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Violation of RightsNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - - - - -
    -

    Risk Analysis

    + +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    - + - + - + - + - @@ -16262,23 +23481,20 @@

    Risk Analysis

    - + - - - - + - + @@ -16289,7 +23505,7 @@

    Risk Analysis

    - @@ -16297,35 +23513,39 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRiskAnalysisRM5x5S1L3 Prefix risk
    LabelRisk AnalysisVery Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RM5x5S1L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    SourceIEC 31010:2019
    Date Created2022-08-182022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16338,31 +23558,31 @@

    Risk Assessment

    - + - - - - + - + - + + + + - @@ -16370,46 +23590,43 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRiskAssessmentRM5x5S1L4 Prefix risk
    LabelRisk AssessmentLow Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RM5x5S1L4
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskManagement + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionAssessment of risk involving its identification, analysis, and evaluationNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    Source
    Date Created2024-02-142022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -16418,13 +23635,10 @@

    Risk Control

    - + - - - @@ -16434,15 +23648,18 @@

    Risk Control

    - + - + + + + - @@ -16450,33 +23667,40 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRiskControlRM5x5S1L5 Prefix risk
    LabelRisk ControlLow Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RM5x5S1L5
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that modifies riskNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
    - + - + - + - + - + + + @@ -16488,31 +23712,31 @@

    Risk Management

    - + - - - - + - + - + + + + - @@ -16521,35 +23745,37 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRiskManagementRM5x5S2L1 Prefix risk
    LabelRisk ManagementVery Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RM5x5S2L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    Source
    Date Created2024-06-122022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16563,23 +23789,20 @@

    Risk Matrix

    - + - - - - + - + @@ -16590,7 +23813,7 @@

    Risk Matrix

    - @@ -16599,23 +23822,23 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRiskMatrixRM5x5S2L2 Prefix risk
    LabelRisk MatrixLow Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM5x5S2L2
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -16627,7 +23850,8 @@

    Risk Matrix 3x3

    - @@ -16642,7 +23866,7 @@

    Risk Matrix 3x3

    - + @@ -16675,23 +23899,23 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRiskMatrix3x3RM5x5S2L3 Prefix risk
    LabelRisk Matrix 3x3Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM5x5S2L3
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -16703,7 +23927,8 @@

    Risk Matrix 5x5

    - @@ -16718,7 +23943,7 @@

    Risk Matrix 5x5

    - + @@ -16751,23 +23976,23 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRiskMatrix5x5RM5x5S2L4 Prefix risk
    LabelRisk Matrix 5x5Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM5x5S2L4
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -16779,7 +24004,8 @@

    Risk Matrix 7x7

    - @@ -16794,7 +24020,7 @@

    Risk Matrix 7x7

    - + @@ -16826,43 +24052,43 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    + +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRiskMatrix7x7RM5x5S2L5 Prefix risk
    LabelRisk Matrix 7x7High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM5x5S2L5
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + - + - - - - - + @@ -16871,7 +24097,7 @@

    Risk Source

    - + @@ -16884,18 +24110,18 @@

    Risk Source

    - + + - - - - + + + - @@ -16904,23 +24130,23 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRiskSourceRM5x5S3L1 Prefix risk
    LabelRisk SourceVery Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM5x5S3L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -16932,7 +24158,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - - + @@ -16981,23 +24207,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM3x3S1L1RM5x5S3L2 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM5x5S3L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16948,7 +24174,7 @@

    Low Risk (RM3x3 S:1 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -17009,7 +24235,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - - + @@ -17058,23 +24284,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM3x3S1L2RM5x5S3L3 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM5x5S3L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17025,7 +24251,7 @@

    Low Risk (RM3x3 S:1 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -17086,7 +24312,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - - + @@ -17135,23 +24361,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM3x3S1L3RM5x5S3L4 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM5x5S3L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17102,7 +24328,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -17163,7 +24389,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - - + @@ -17212,23 +24438,23 @@

    Low Risk (RM3x3 S:2 L:1)

    -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM3x3S2L1RM5x5S3L5 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM5x5S3L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17179,7 +24405,7 @@

    Low Risk (RM3x3 S:2 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -17240,7 +24466,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + @@ -17289,23 +24515,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM3x3S2L2RM5x5S4L1 Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S4L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17256,7 +24482,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -17317,7 +24543,7 @@

    High Risk (RM3x3 S:2 L:3)

    - - + @@ -17366,23 +24592,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM3x3S2L3RM5x5S4L2 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S4L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17333,7 +24559,7 @@

    High Risk (RM3x3 S:2 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -17394,7 +24620,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - + @@ -17443,23 +24669,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM3x3S3L1RM5x5S4L3 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S4L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17410,7 +24636,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -17471,7 +24697,7 @@

    High Risk (RM3x3 S:3 L:2)

    - - + @@ -17520,23 +24746,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM3x3S3L2RM5x5S4L4 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S4L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17487,7 +24713,7 @@

    High Risk (RM3x3 S:3 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -17548,7 +24774,7 @@

    High Risk (RM3x3 S:3 L:3)

    - - + @@ -17597,23 +24823,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM3x3S3L3RM5x5S4L5 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S4L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17564,7 +24790,7 @@

    High Risk (RM3x3 S:3 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -17641,7 +24867,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -17674,23 +24900,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM5x5S1L1RM5x5S5L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S5L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -17718,7 +24944,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -17751,23 +24977,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM5x5S1L2RM5x5S5L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S5L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -17795,7 +25021,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -17828,23 +25054,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM5x5S1L3RM5x5S5L3 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S5L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -17872,7 +25098,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - + @@ -17905,23 +25131,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM5x5S1L4RM5x5S5L4 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S5L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -17949,7 +25175,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - + @@ -17982,23 +25208,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM5x5S1L5RM5x5S5L5 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S5L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -18010,7 +25236,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - - + @@ -18059,23 +25285,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM5x5S2L1RM7x7S1L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM7x7S1L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18026,7 +25252,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -18087,7 +25313,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - - + @@ -18136,23 +25362,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM5x5S2L2RM7x7S1L2 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM7x7S1L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18103,7 +25329,7 @@

    Low Risk (RM5x5 S:2 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -18164,7 +25390,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - - + @@ -18213,23 +25439,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM5x5S2L3RM7x7S1L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM7x7S1L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18180,7 +25406,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -18241,7 +25467,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - - + @@ -18290,23 +25516,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM5x5S2L4RM7x7S1L4 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM7x7S1L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18257,7 +25483,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -18318,7 +25544,7 @@

    High Risk (RM5x5 S:2 L:5)

    - - + @@ -18367,23 +25593,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM5x5S2L5RM7x7S1L5 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM7x7S1L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18334,7 +25560,7 @@

    High Risk (RM5x5 S:2 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + - + @@ -18395,7 +25621,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - - + @@ -18444,23 +25670,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM5x5S3L1RM7x7S1L6 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM7x7S1L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18411,7 +25637,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -18472,7 +25698,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - - + @@ -18521,23 +25747,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM5x5S3L2RM7x7S1L7 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM7x7S1L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18488,7 +25714,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -18549,7 +25775,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - - + @@ -18598,23 +25824,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM5x5S3L3RM7x7S2L1 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM7x7S2L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18565,7 +25791,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -18626,7 +25852,7 @@

    High Risk (RM5x5 S:3 L:4)

    - - + @@ -18675,23 +25901,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM5x5S3L4RM7x7S2L2 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM7x7S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18642,7 +25868,7 @@

    High Risk (RM5x5 S:3 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -18703,7 +25929,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - - + @@ -18752,23 +25978,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM5x5S3L5RM7x7S2L3 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM7x7S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18719,7 +25945,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -18780,7 +26006,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - - + @@ -18829,23 +26055,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM5x5S4L1RM7x7S2L4 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM7x7S2L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18796,7 +26022,7 @@

    Low Risk (RM5x5 S:4 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -18857,7 +26083,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - - + @@ -18906,23 +26132,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM5x5S4L2RM7x7S2L5 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM7x7S2L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18873,7 +26099,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -18934,7 +26160,7 @@

    High Risk (RM5x5 S:4 L:3)

    - - + @@ -18983,23 +26209,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM5x5S4L3RM7x7S2L6 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM7x7S2L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18950,7 +26176,7 @@

    High Risk (RM5x5 S:4 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -19011,7 +26237,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - - + @@ -19060,23 +26286,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM5x5S4L4RM7x7S2L7 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM7x7S2L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19027,7 +26253,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -19088,7 +26314,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - - + @@ -19137,23 +26363,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM5x5S4L5RM7x7S3L1 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM7x7S3L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19104,7 +26330,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -19165,7 +26391,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - - + @@ -19214,23 +26440,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM5x5S5L1RM7x7S3L2 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S3L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19181,7 +26407,7 @@

    Low Risk (RM5x5 S:5 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -19242,7 +26468,7 @@

    High Risk (RM5x5 S:5 L:2)

    - - + @@ -19291,23 +26517,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM5x5S5L2RM7x7S3L3 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S3L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19258,7 +26484,7 @@

    High Risk (RM5x5 S:5 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -19319,7 +26545,7 @@

    High Risk (RM5x5 S:5 L:3)

    - - + @@ -19368,23 +26594,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM5x5S5L3RM7x7S3L4 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S3L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19335,7 +26561,7 @@

    High Risk (RM5x5 S:5 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -19396,7 +26622,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - - + @@ -19445,23 +26671,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM5x5S5L4RM7x7S3L5 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S3L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19412,7 +26638,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -19473,7 +26699,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - - + @@ -19522,23 +26748,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM5x5S5L5RM7x7S3L6 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S3L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19489,7 +26715,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -19566,7 +26792,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - + @@ -19599,23 +26825,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S1L1RM7x7S3L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -19643,7 +26869,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - + @@ -19676,23 +26902,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S1L2RM7x7S4L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -19720,7 +26946,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - + @@ -19753,23 +26979,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S1L3RM7x7S4L2 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -19797,7 +27023,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - + @@ -19830,23 +27056,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S1L4RM7x7S4L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -19874,7 +27100,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - + @@ -19907,23 +27133,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S1L5RM7x7S4L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -19951,7 +27177,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -19984,23 +27210,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S1L6RM7x7S4L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -20028,7 +27254,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -20061,23 +27287,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S1L7RM7x7S4L6 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -20105,7 +27331,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -20138,23 +27364,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S2L1RM7x7S4L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -20182,7 +27408,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -20215,23 +27441,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S2L2RM7x7S5L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -20259,7 +27485,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -20292,23 +27518,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S2L3RM7x7S5L2 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -20336,7 +27562,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -20369,23 +27595,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S2L4RM7x7S5L3 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -20413,7 +27639,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -20446,23 +27672,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S2L5RM7x7S5L4 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -20490,7 +27716,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -20523,23 +27749,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S2L6RM7x7S5L5 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -20567,7 +27793,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -20600,23 +27826,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S2L7RM7x7S5L6 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -20644,7 +27870,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -20677,23 +27903,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S3L1RM7x7S5L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -20721,7 +27947,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -20754,23 +27980,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S3L2RM7x7S6L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -20798,7 +28024,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -20831,23 +28057,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S3L3RM7x7S6L2 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -20875,7 +28101,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -20908,23 +28134,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S3L4RM7x7S6L3 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -20952,7 +28178,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -20985,23 +28211,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S3L5RM7x7S6L4 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -21029,7 +28255,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -21062,23 +28288,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S3L6RM7x7S6L5 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -21106,7 +28332,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -21139,23 +28365,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S3L7RM7x7S6L6 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -21183,7 +28409,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -21216,23 +28442,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S4L1RM7x7S6L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -21260,7 +28486,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -21293,23 +28519,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S4L2RM7x7S7L1 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -21337,7 +28563,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -21370,23 +28596,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S4L3RM7x7S7L2 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -21414,7 +28640,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -21447,23 +28673,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermRM7x7S4L4RM7x7S7L3 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)High Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S7L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -21491,7 +28717,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -21524,23 +28750,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermRM7x7S4L5RM7x7S7L4 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S7L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -21568,7 +28794,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -21601,23 +28827,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermRM7x7S4L6RM7x7S7L5 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S7L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    - + - + - + @@ -21645,7 +28871,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -21678,23 +28904,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermRM7x7S4L7RM7x7S7L6 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)Extremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S7L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -21722,7 +28948,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -21755,38 +28981,40 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    + + + +
    +

    Rule-Based System Design

    TermRM7x7S5L1RM7x7S7L7 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Extremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S7L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + - + - @@ -21799,31 +29027,37 @@

    Low Risk (RM7x7 S:5 L:2)

    - + - + + + + - + + + + - + - + - @@ -21832,38 +29066,42 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    + + + + + +
    +

    Sabotage

    TermRM7x7S5L2RuleBasedSystemDesign Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)Rule-Based System Design
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -21876,14 +29114,17 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + - + + + + @@ -21891,7 +29132,10 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + + + + @@ -21900,7 +29144,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - @@ -21909,38 +29153,42 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    + + + +
    +

    Sampling Bias

    TermRM7x7S5L3Sabotage Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)Sabotage
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateSomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -21953,31 +29201,34 @@

    High Risk (RM7x7 S:5 L:4)

    - + - + + + + - + - + - @@ -21986,38 +29237,41 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    + + + + +
    +

    Scam

    TermRM7x7S5L4SamplingBias Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Sampling Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#SamplingBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22030,14 +29284,17 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + - + + + + @@ -22045,7 +29302,10 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + + + + @@ -22054,7 +29314,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - @@ -22063,38 +29323,41 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    + + + + + +
    +

    Security Attack

    TermRM7x7S5L5Scam Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Scam
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22107,7 +29370,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -22118,20 +29381,14 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - - - - + - - - - + - @@ -22140,38 +29397,42 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    + + + + + + +
    +

    Security Breach

    TermRM7x7S5L6SecurityAttack Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Security Attack
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes an attack on security with the aim of undermining it
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22184,14 +29445,17 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + - + + + + @@ -22199,7 +29463,10 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + + + + @@ -22208,7 +29475,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - @@ -22217,38 +29484,41 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    + + + +
    +

    Selection Bias

    TermRM7x7S5L7SecurityBreach Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)Security Breach
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:OperationalSecurityRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes Security Breach
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22261,31 +29531,34 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + - + + + + - + - + - @@ -22294,38 +29567,51 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    + + + + + + + + +
    +

    Sex Discrimination

    TermRM7x7S6L1SelectionBias Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Selection Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#SelectionBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22338,7 +29624,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -22351,18 +29637,15 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + - - - - + - @@ -22371,38 +29654,44 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    + + + +
    +

    Sexism

    TermRM7x7S6L2SexDiscrimination Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)Sex Discrimination
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#SexDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateDiscrimination based on a person's biological sex
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22415,7 +29704,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -22428,18 +29717,15 @@

    High Risk (RM7x7 S:6 L:3)

    - + - - - - + - @@ -22448,38 +29734,39 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    + + + +
    +

    Sexual Harassment

    TermRM7x7S6L3Sexism Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Sexism
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#Sexism
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighDiscrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22490,10 +29777,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - - - - + @@ -22503,20 +29787,14 @@

    Very High Risk (RM7x7 S:6 L:4)

    - - - - + - - - - + - @@ -22525,38 +29803,44 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    + + + +
    +

    SexualOrientation Discrimination

    TermRM7x7S6L4SexualHarassment Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Sexual Harassment
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#SexualHarassment
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Harm + → risk:IndividualRisk
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22569,7 +29853,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -22582,18 +29866,15 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + - - - - + - @@ -22602,38 +29883,39 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    + + + +
    +

    Sexual Violence

    TermRM7x7S6L5SexualOrientationDiscrimination Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)SexualOrientation Discrimination
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#SexualOrientationDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighDiscrimination based on a person's sexual orientation, typically against those who are not heterosexual
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22646,14 +29928,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + + + + @@ -22661,7 +29946,10 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + + + + @@ -22670,7 +29958,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - @@ -22679,42 +29967,47 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Share Risk

    TermRM7x7S6L6SexualViolence Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Sexual Violence
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#SexualViolence
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Harm + → risk:IndividualRisk
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes Sexual Violence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -22723,7 +30016,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -22736,7 +30029,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -22747,7 +30040,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - @@ -22756,38 +30049,40 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    + + + +
    +

    Simpson'S Paradox Bias

    TermRM7x7S6L7ShareRisk Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Share Risk
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#ShareRisk
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    Date Created2022-08-172024-05-19
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -22800,31 +30095,34 @@

    Low Risk (RM7x7 S:7 L:1)

    - + - + + + + - + - + - @@ -22833,38 +30131,39 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    + + + +
    +

    Social Disadvantage

    TermRM7x7S7L1SimpsonsParadoxBias Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)Simpson'S Paradox Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#SimpsonsParadoxBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22877,7 +30176,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -22890,18 +30189,21 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + - + + + + - + - @@ -22910,38 +30212,40 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    + + + +
    +

    Societal Bias

    TermRM7x7S7L2SocialDisadvantage Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Social Disadvantage
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#SocialDisadvantage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateSomething that acts as or causes Social Disadvantage
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22954,31 +30258,34 @@

    High Risk (RM7x7 S:7 L:3)

    - + - + + + + - + - + - @@ -22987,38 +30294,39 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    + + + +
    +

    Societal Health & Safety

    TermRM7x7S7L3SocietalBias Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Societal Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#SocietalBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23029,10 +30337,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - - - - + @@ -23042,20 +30347,14 @@

    Very High Risk (RM7x7 S:7 L:4)

    - - - - + - - - - + - @@ -23064,38 +30363,38 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    + + + +
    +

    Societal Risk

    TermRM7x7S7L4SocietalHealthSafety Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Societal Health & Safety
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#SocietalHealthSafety
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23108,7 +30407,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -23119,20 +30418,14 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - - - - + - - - - + - @@ -23141,42 +30434,47 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Source Control

    TermRM7x7S7L5SocietalRisk Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Societal Risk
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#SocietalRisk
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighRisks and issues that affect or have the potential to affect society at large or specific groups in society
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -23185,7 +30483,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -23198,7 +30496,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -23209,7 +30507,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - @@ -23218,38 +30516,42 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    + + + + + +
    +

    Spoofing

    TermRM7x7S7L6SourceControl Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Source Control
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#SourceControl
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighRisk Mitigation Measure that controls the Source
    Date Created2022-08-172024-05-19
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -23262,14 +30564,17 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - + + + + @@ -23277,7 +30582,10 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + + + + @@ -23286,7 +30594,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - @@ -23295,35 +30603,38 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    + + + +
    +

    Statistical Bias

    TermRM7x7S7L7Spoofing Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Spoofing
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#Spoofing
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes Spoofing
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23338,12 +30649,9 @@

    Rule-Based System Design

    - + - - - - + @@ -23362,13 +30670,13 @@

    Rule-Based System Design

    - + - @@ -23377,42 +30685,40 @@

    Rule-Based System Design

    -
    -

    Sabotage

    + + + + +
    +

    System Failure

    TermRuleBasedSystemDesignStatisticalBias Prefix risk
    LabelRule-Based System DesignStatistical Bias
    IRIhttps://w3id.org/dpv/risk#RuleBasedSystemDesignhttps://w3id.org/dpv/risk#StatisticalBias
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias + risk:DataBiasrisk:Biasrisk:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -23425,16 +30731,19 @@

    Sabotage

    - + - + + + + - + @@ -23455,7 +30764,7 @@

    Sabotage

    - @@ -23464,39 +30773,42 @@

    Sabotage

    -
    -

    Sampling Bias

    + + + + + +
    +

    System Intrusion

    TermSabotageSystemFailure Prefix risk
    LabelSabotageSystem Failure
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#SystemFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:OperationalSecurityRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes SabotageSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Landscape for Ransomware Attacks 2022
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23509,7 +30821,7 @@

    Sampling Bias

    - + @@ -23518,25 +30830,28 @@

    Sampling Bias

    - + - + - + + + + - + - @@ -23545,38 +30860,39 @@

    Sampling Bias

    -
    -

    Scam

    + + + + +
    +

    System Malfunction

    TermSamplingBiasSystemIntrusion Prefix risk
    LabelSampling BiasSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#SamplingBiashttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when data records are not collected randomly from the intended populationSomething that acts as or causes System Intrusion
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -23590,9 +30906,12 @@

    Scam

    - + - + + + + @@ -23620,7 +30939,7 @@

    Scam

    - @@ -23629,45 +30948,39 @@

    Scam

    -
    -

    Security Attack

    + + + +
    +

    Terrorism

    TermScamSystemMalfunction Prefix risk
    LabelScamSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:OperationalSecurityRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes ScamSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -23680,25 +30993,37 @@

    Security Attack

    - + - + + + + - - - + + + + + + + + + + + + - @@ -23706,50 +31031,51 @@

    Security Attack

    - -
    -

    Security Breach

    +
    +

    Threat

    TermSecurityAttackTerrorism Prefix risk
    LabelSecurity AttackTerrorism
    IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#Terrorism
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:SocietalRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itSomething that acts as or causes Terrorism
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + + + + + + + + @@ -23758,37 +31084,28 @@

    Security Breach

    - + - - - - + - + - - - - - - - - + + - @@ -23796,43 +31113,40 @@

    Security Breach

    - -
    -

    Selection Bias

    +
    +

    Threat Source

    TermSecurityBreachThreat Prefix risk
    LabelSecurity BreachThreat
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#Threat
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:RiskSourcedpv:RiskConcept
    Subject of relation risk:exploitsVulnerability, + risk:hasThreatSource +
    Object of relation risk:causedByThreat, + risk:hasRiskSource, + risk:isExploitedBy +
    DefinitionSomething that acts as or causes Security BreachRisk source event which causes Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - + - + + + + @@ -23841,34 +31155,28 @@

    Selection Bias

    - + - - - - + - + - - - - + - @@ -23880,37 +31188,43 @@

    Selection Bias

    - - -
    -

    Sexual Violence

    +
    +

    Transphobia

    TermSelectionBiasThreatSource Prefix risk
    LabelSelection BiasThreat Source
    IRIhttps://w3id.org/dpv/risk#SelectionBiashttps://w3id.org/dpv/risk#ThreatSource
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept -
    Object of relation risk:hasThreatSource +
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionSource of threat event, including both agent and non-agent sources
    Source
    Date Created2024-09-132024-02-14
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section CORE in RISK
    - + - + - + - + - + + @@ -23923,37 +31237,28 @@

    Sexual Violence

    - + - - - - + - + - - - - - - - - + + - @@ -23962,47 +31267,47 @@

    Sexual Violence

    -
    -

    Share Risk

    + + + + + + +
    +

    Unauthorised Access to Premises

    TermSexualViolenceTransphobia Prefix risk
    LabelSexual ViolenceTransphobia
    IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#Transphobia
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IndividualRisk + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Sexual ViolenceHostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -24011,22 +31316,28 @@

    Share Risk

    - + - + + + + - + - + + + + @@ -24035,7 +31346,7 @@

    Share Risk

    - @@ -24044,37 +31355,42 @@

    Share Risk

    -
    -

    Simpson'S Paradox Bias

    + + + + + + +
    +

    Unauthorised Activity

    TermShareRiskUnauthorisedAccesstoPremises Prefix risk
    LabelShare RiskUnauthorised Access to Premises
    IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#UnauthorisedAccesstoPremises
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Unauthorised Access to Premises
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24087,34 +31403,25 @@

    Simpson'S Paradox Bias

    - + - - - - + - - - - + - - - - + - @@ -24123,35 +31430,41 @@

    Simpson'S Paradox Bias

    -
    -

    Social Disadvantage

    + + + + + +
    +

    Unauthorised Code Access

    TermSimpsonsParadoxBiasUnauthorisedActivity Prefix risk
    LabelSimpson'S Paradox BiasUnauthorised Activity
    IRIhttps://w3id.org/dpv/risk#SimpsonsParadoxBiashttps://w3id.org/dpv/risk#UnauthorisedActivity
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combinedSomething that acts as or causes Unauthorised Activity
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24165,20 +31478,23 @@

    Social Disadvantage

    - + - + + + + - + @@ -24186,13 +31502,13 @@

    Social Disadvantage

    - + - @@ -24201,37 +31517,41 @@

    Social Disadvantage

    -
    -

    Societal Bias

    + + + + +
    +

    Unauthorised Code Disclosure

    TermSocialDisadvantageUnauthorisedCodeAccess Prefix risk
    LabelSocial DisadvantageUnauthorised Code Access
    IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Social DisadvantageSomething that acts as or causes Unauthorised Code Access
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-192022-08-17
    Date Modified
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24244,7 +31564,7 @@

    Societal Bias

    - + @@ -24253,25 +31573,28 @@

    Societal Bias

    - + - + - + + + + - + - @@ -24280,35 +31603,40 @@

    Societal Bias

    -
    -

    Societal Health & Safety

    + + + + +
    +

    Unauthorised Code Modification

    TermSocietalBiasUnauthorisedCodeDisclosure Prefix risk
    LabelSocietal BiasUnauthorised Code Disclosure
    IRIhttps://w3id.org/dpv/risk#SocietalBiashttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in societySomething that acts as or causes Unauthorised Code Disclosure
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24320,24 +31648,39 @@

    Societal Health & Safety

    - + + + + - + + + + - - - + + + + + + + + + + + + - @@ -24346,35 +31689,41 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + + + + +
    +

    Unauthorised Data Access

    TermSocietalHealthSafetyUnauthorisedCodeModification Prefix risk
    LabelSocietal Health & SafetyUnauthorised Code Modification
    IRIhttps://w3id.org/dpv/risk#SocietalHealthSafetyhttps://w3id.org/dpv/risk#UnauthorisedCodeModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code Modification
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24387,25 +31736,37 @@

    Societal Risk

    - + - + + + + - - - + + + + + + + + + + + + - @@ -24414,47 +31775,45 @@

    Societal Risk

    -
    -

    Source Control

    + + + + +
    +

    Unauthorised Data Disclosure

    TermSocietalRiskUnauthorisedDataAccess Prefix risk
    LabelSocietal RiskUnauthorised Data Access
    IRIhttps://w3id.org/dpv/risk#SocietalRiskhttps://w3id.org/dpv/risk#UnauthorisedDataAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societySomething that acts as or causes Unauthorised Data Access
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -24463,22 +31822,28 @@

    Source Control

    - + - + + + + - + - + + + + @@ -24487,7 +31852,7 @@

    Source Control

    - @@ -24496,45 +31861,40 @@

    Source Control

    -
    -

    Spoofing

    + + + + +
    +

    Unauthorised Data Modification

    TermSourceControlUnauthorisedDataDisclosure Prefix risk
    LabelSource ControlUnauthorised Data Disclosure
    IRIhttps://w3id.org/dpv/risk#SourceControlhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceSomething that acts as or causes Unauthorised Data Disclosure
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -24548,7 +31908,7 @@

    Spoofing

    - + @@ -24557,7 +31917,7 @@

    Spoofing

    - + @@ -24578,7 +31938,7 @@

    Spoofing

    - @@ -24587,37 +31947,41 @@

    Spoofing

    -
    -

    Statistical Bias

    + + + + +
    +

    Unauthorised Information Disclosure

    TermSpoofingUnauthorisedDataModification Prefix risk
    LabelSpoofingUnauthorised Data Modification
    IRIhttps://w3id.org/dpv/risk#Spoofinghttps://w3id.org/dpv/risk#UnauthorisedDataModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes SpoofingSomething that acts as or causes Unauthorised Data Modification
    SourceISO/IEC 27005:2018, ISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24630,7 +31994,7 @@

    Statistical Bias

    - + @@ -24639,25 +32003,28 @@

    Statistical Bias

    - + - + - + + + + - + - @@ -24666,38 +32033,40 @@

    Statistical Bias

    -
    -

    System Failure

    + + + + +
    +

    Unauthorised Re-Identification

    TermStatisticalBiasUnauthorisedInformationDisclosure Prefix risk
    LabelStatistical BiasUnauthorised Information Disclosure
    IRIhttps://w3id.org/dpv/risk#StatisticalBiashttps://w3id.org/dpv/risk#UnauthorisedInformationDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimatesSomething that acts as or causes Unauthorised Information Disclosure
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -24711,26 +32080,20 @@

    System Failure

    - + - - - - + - - - - + - + @@ -24738,13 +32101,13 @@

    System Failure

    - + - @@ -24753,45 +32116,41 @@

    System Failure

    -
    -

    System Intrusion

    + + + + +
    +

    Unauthorised Resource Use

    TermSystemFailureUnauthorisedReidentification Prefix risk
    LabelSystem FailureUnauthorised Re-Identification
    IRIhttps://w3id.org/dpv/risk#SystemFailurehttps://w3id.org/dpv/risk#UnauthorisedReidentification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes System FailureSomething that acts as or causes Unauthorised Re-Identification
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172022-08-19
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -24804,7 +32163,7 @@

    System Intrusion

    - + @@ -24813,7 +32172,7 @@

    System Intrusion

    - + @@ -24834,7 +32193,7 @@

    System Intrusion

    - @@ -24843,38 +32202,41 @@

    System Intrusion

    -
    -

    System Malfunction

    + + + + + +
    +

    Unauthorised System Access

    TermSystemIntrusionUnauthorisedResourceUse Prefix risk
    LabelSystem IntrusionUnauthorised Resource Use
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#UnauthorisedResourceUse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes System IntrusionSomething that acts as or causes Unauthorised Resource Use
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -24888,12 +32250,9 @@

    System Malfunction

    - + - - - - + @@ -24921,7 +32280,7 @@

    System Malfunction

    - @@ -24930,35 +32289,40 @@

    System Malfunction

    -
    -

    Terrorism

    + + + + +
    +

    Unauthorised System Modification

    TermSystemMalfunctionUnauthorisedSystemAccess Prefix risk
    LabelSystem MalfunctionUnauthorised System Access
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#UnauthorisedSystemAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionSomething that acts as or causes Unauthorised System Access
    Usage NoteHere system refers to both hardware and software systems
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24972,7 +32336,7 @@

    Terrorism

    - + @@ -24981,7 +32345,7 @@

    Terrorism

    - + @@ -25002,7 +32366,7 @@

    Terrorism

    - @@ -25010,51 +32374,47 @@

    Terrorism

    -
    -

    Threat

    + + + + + + +
    +

    Unwanted Code Deletion

    TermTerrorismUnauthorisedSystemModification Prefix risk
    LabelTerrorismUnauthorised System Modification
    IRIhttps://w3id.org/dpv/risk#Terrorismhttps://w3id.org/dpv/risk#UnauthorisedSystemModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes TerrorismSomething that acts as or causes Unauthorised System Modification
    SourceISO/IEC 27005:2018ENISA Methodology for Sectoral Cybersecurity Assessments
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + + @@ -25063,28 +32423,37 @@

    Threat

    - + - + + + + - + - - + + + + + + + + - @@ -25092,40 +32461,47 @@

    Threat

    -
    -

    Threat Source

    + + + + + + +
    +

    Unwanted Data Deletion

    TermThreatUnwantedCodeDeletion Prefix risk
    LabelThreatUnwanted Code Deletion
    IRIhttps://w3id.org/dpv/risk#Threathttps://w3id.org/dpv/risk#UnwantedCodeDeletion
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskSource + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    Subject of relation risk:exploitsVulnerability, - risk:hasThreatSource -
    Object of relation risk:causedByThreat, - risk:hasRiskSource, - risk:isExploitedBy -
    DefinitionRisk source event which causes RiskSomething that acts as or causes Unwanted Code Deletion
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + - - - - + @@ -25134,28 +32510,37 @@

    Threat Source

    - + - + + + + - + - - + + + + + + + + - @@ -25164,45 +32549,41 @@

    Threat Source

    -
    -

    Unauthorised Access to Premises

    + + + + +
    +

    Unwanted Disclosure of Data

    TermThreatSourceUnwantedDataDeletion Prefix risk
    LabelThreat SourceUnwanted Data Deletion
    IRIhttps://w3id.org/dpv/risk#ThreatSourcehttps://w3id.org/dpv/risk#UnwantedDataDeletion
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    Object of relation risk:hasThreatSource -
    DefinitionSource of threat event, including both agent and non-agent sourcesSomething that acts as or causes Unwanted Data Deletion
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -25215,7 +32596,7 @@

    Unauthorised Access to Premises

    - + @@ -25245,7 +32626,7 @@

    Unauthorised Access to Premises

    - @@ -25254,45 +32635,37 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Activity

    + + +
    +

    User Risks

    TermUnauthorisedAccesstoPremisesUnwantedDisclosureData Prefix risk
    LabelUnauthorised Access to PremisesUnwanted Disclosure of Data
    IRIhttps://w3id.org/dpv/risk#UnauthorisedAccesstoPremiseshttps://w3id.org/dpv/risk#UnwantedDisclosureData
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesSomething that acts as or causes Unwanted Disclosure of Data
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -25305,7 +32678,7 @@

    Unauthorised Activity

    - + @@ -25323,7 +32696,7 @@

    Unauthorised Activity

    - @@ -25332,46 +32705,48 @@

    Unauthorised Activity

    -
    -

    Unauthorised Code Access

    +
    +

    Very High Likelihood

    TermUnauthorisedActivityUserRisks Prefix risk
    LabelUnauthorised ActivityUser Risks
    IRIhttps://w3id.org/dpv/risk#UnauthorisedActivityhttps://w3id.org/dpv/risk#UserRisks
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised ActivityConcepts associated with risks that arise due to User or Human use
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + + + + @@ -25380,28 +32755,25 @@

    Unauthorised Code Access

    - + - + + + + - - - - + - + - - - - + @@ -25410,7 +32782,7 @@

    Unauthorised Code Access

    - @@ -25419,43 +32791,48 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    +
    +

    Very High Risk

    TermUnauthorisedCodeAccessVeryHighLikelihood Prefix risk
    LabelUnauthorised Code AccessVery High Likelihood
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeAccesshttps://w3id.org/dpv/risk#VeryHighLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:IntegrityConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Unauthorised Code AccessLevel where Likelihood is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25464,28 +32841,25 @@

    Unauthorised Code Disclosure

    - + - + + + + - - - - + - + - - - - + @@ -25494,7 +32868,7 @@

    Unauthorised Code Disclosure

    - @@ -25503,43 +32877,48 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    +
    +

    Very High Severity

    TermUnauthorisedCodeDisclosureVeryHighRisk Prefix risk
    LabelUnauthorised Code DisclosureVery High Risk
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosurehttps://w3id.org/dpv/risk#VeryHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept + risk:5RiskLevels + → dpv:RiskLevel
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureLevel where Risk is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25548,28 +32927,25 @@

    Unauthorised Code Modification

    - + - + + + + - - - - + - + - - - - + @@ -25578,7 +32954,7 @@

    Unauthorised Code Modification

    - @@ -25587,43 +32963,48 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    +
    +

    Very Low Likelihood

    TermUnauthorisedCodeModificationVeryHighSeverity Prefix risk
    LabelUnauthorised Code ModificationVery High Severity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeModificationhttps://w3id.org/dpv/risk#VeryHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5SeverityLevels + → dpv:Severity
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Unauthorised Code ModificationLevel where Severity is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25632,28 +33013,25 @@

    Unauthorised Data Access

    - + - + + + + - - - - + - + - - - - + @@ -25662,7 +33040,7 @@

    Unauthorised Data Access

    - @@ -25671,43 +33049,48 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    +
    +

    Very Low Risk

    TermUnauthorisedDataAccessVeryLowLikelihood Prefix risk
    LabelUnauthorised Data AccessVery Low Likelihood
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataAccesshttps://w3id.org/dpv/risk#VeryLowLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConfidentialityConcept + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Unauthorised Data AccessLevel where Likelihood is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25716,28 +33099,25 @@

    Unauthorised Data Disclosure

    - + - + + + + - - - - + - + - - - - + @@ -25746,7 +33126,7 @@

    Unauthorised Data Disclosure

    - @@ -25755,43 +33135,48 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Very Low Severity

    TermUnauthorisedDataDisclosureVeryLowRisk Prefix risk
    LabelUnauthorised Data DisclosureVery Low Risk
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosurehttps://w3id.org/dpv/risk#VeryLowRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept + risk:5RiskLevels + → dpv:RiskLevel
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureLevel where Risk is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25800,28 +33185,25 @@

    Unauthorised Data Modification

    - + - + + + + - - - - + - + - - - - + @@ -25830,7 +33212,7 @@

    Unauthorised Data Modification

    - @@ -25839,39 +33221,37 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Information Disclosure

    + + +
    +

    Violating Code of Conduct

    TermUnauthorisedDataModificationVeryLowSeverity Prefix risk
    LabelUnauthorised Data ModificationVery Low Severity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataModificationhttps://w3id.org/dpv/risk#VeryLowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5SeverityLevels + → dpv:Severity
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Unauthorised Data ModificationLevel where Severity is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - @@ -25884,16 +33264,19 @@

    Unauthorised Information Disclosure

    - + - + + + + - + @@ -25914,7 +33297,7 @@

    Unauthorised Information Disclosure

    - @@ -25923,39 +33306,37 @@

    Unauthorised Information Disclosure

    -
    -

    Unauthorised Re-Identification

    + + +
    +

    Violation of Contractual Obligation

    TermUnauthorisedInformationDisclosureViolatingCodeOfConduct Prefix risk
    LabelUnauthorised Information DisclosureViolating Code of Conduct
    IRIhttps://w3id.org/dpv/risk#UnauthorisedInformationDisclosurehttps://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureSomething that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -25968,20 +33349,26 @@

    Unauthorised Re-Identification

    - + - + + + + - + + + + - + @@ -25989,13 +33376,13 @@

    Unauthorised Re-Identification

    - + - @@ -26004,39 +33391,37 @@

    Unauthorised Re-Identification

    -
    -

    Unauthorised Resource Use

    + + +
    +

    Violating Ethics Code

    TermUnauthorisedReidentificationViolatingContractualObligation Prefix risk
    LabelUnauthorised Re-IdentificationViolation of Contractual Obligation
    IRIhttps://w3id.org/dpv/risk#UnauthorisedReidentificationhttps://w3id.org/dpv/risk#ViolatingContractualObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -26049,9 +33434,12 @@

    Unauthorised Resource Use

    - + - + + + + @@ -26079,7 +33467,7 @@

    Unauthorised Resource Use

    - @@ -26088,42 +33476,37 @@

    Unauthorised Resource Use

    -
    -

    Unauthorised System Access

    + + +
    +

    Violation of Legal Obligations

    TermUnauthorisedResourceUseViolatingEthicsCode Prefix risk
    LabelUnauthorised Resource UseViolating Ethics Code
    IRIhttps://w3id.org/dpv/risk#UnauthorisedResourceUsehttps://w3id.org/dpv/risk#ViolatingEthicsCode
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Resource UseSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26136,9 +33519,12 @@

    Unauthorised System Access

    - + - + + + + @@ -26166,7 +33552,7 @@

    Unauthorised System Access

    - @@ -26175,39 +33561,37 @@

    Unauthorised System Access

    -
    -

    Unauthorised System Modification

    + + +
    +

    Violating Policy

    TermUnauthorisedSystemAccessViolatingLegalObligation Prefix risk
    LabelUnauthorised System AccessViolation of Legal Obligations
    IRIhttps://w3id.org/dpv/risk#UnauthorisedSystemAccesshttps://w3id.org/dpv/risk#ViolatingLegalObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised System AccessSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -26220,37 +33604,25 @@

    Unauthorised System Modification

    - + - - - - + - - - - - - - - - - - - + + + - @@ -26259,42 +33631,37 @@

    Unauthorised System Modification

    -
    -

    Unwanted Code Deletion

    + + +
    +

    Violation of Statutory Obligations

    TermUnauthorisedSystemModificationViolatingPolicy Prefix risk
    LabelUnauthorised System ModificationViolating Policy
    IRIhttps://w3id.org/dpv/risk#UnauthorisedSystemModificationhttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised System ModificationSomething that acts as or causes violation of policy which can be either internal or external policy
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26307,16 +33674,19 @@

    Unwanted Code Deletion

    - + - + + + + - + @@ -26337,7 +33707,7 @@

    Unwanted Code Deletion

    - @@ -26346,42 +33716,39 @@

    Unwanted Code Deletion

    -
    -

    Unwanted Data Deletion

    + + + +
    +

    Violence against children

    TermUnwantedCodeDeletionViolatingStatutoryObligations Prefix risk
    LabelUnwanted Code DeletionViolation of Statutory Obligations
    IRIhttps://w3id.org/dpv/risk#UnwantedCodeDeletionhttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unwanted Code DeletionSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26394,16 +33761,19 @@

    Unwanted Data Deletion

    - + - + + + + - + @@ -26424,7 +33794,7 @@

    Unwanted Data Deletion

    - @@ -26432,44 +33802,47 @@

    Unwanted Data Deletion

    - -
    -

    Unwanted Disclosure of Data

    +
    +

    Vulnerability

    TermUnwantedDataDeletionViolenceAgainstChildren Prefix risk
    LabelUnwanted Data DeletionViolence against children
    IRIhttps://w3id.org/dpv/risk#UnwantedDataDeletionhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Unwanted Data DeletionSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - + + + + + + + + + @@ -26478,87 +33851,251 @@

    Unwanted Disclosure of Data

    - + - - - - + - + - - - - - - - - + + -
    TermUnwantedDisclosureDataVulnerability Prefix risk
    LabelUnwanted Disclosure of DataVulnerability
    IRIhttps://w3id.org/dpv/risk#UnwantedDisclosureDatahttps://w3id.org/dpv/risk#Vulnerability
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Subject of relation risk:isExploitedBy, + risk:isVulnerabilityOf +
    Object of relation risk:causedByVulnerability, + risk:exploitsVulnerability, + risk:hasVulnerability +
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    + +
    +
    +

    Properties

    + -
    -

    User Risks

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    caused by threat

    - + - + - + - + - - - - + - + + + + - + @@ -26569,14 +34106,17 @@

    User Risks

    - + + + + - @@ -26584,63 +34124,50 @@

    User Risks

    - -
    -

    Very High Likelihood

    +
    +

    caused by vulnerability

    TermUserRiskscausedByThreat Prefix risk
    LabelUser Riskscaused by threat
    IRIhttps://w3id.org/dpv/risk#UserRiskshttps://w3id.org/dpv/risk#causedByThreat
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types dpv:RiskConcept -
    Range includes risk:Threat +
    DefinitionConcepts associated with risks that arise due to User or Human useIndicates the cause of associated context (subject) was the indicated threat (object)
    Date Created2024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + @@ -26651,18 +34178,15 @@

    Very High Likelihood

    - + - - - - + - @@ -26671,148 +34195,279 @@

    Very High Likelihood

    -
    -

    Very High Risk

    -
    TermVeryHighLikelihoodcausedByVulnerability Prefix risk
    LabelVery High Likelihoodcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#VeryHighLikelihoodhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdf:Property, skos:Concept
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    Range includes risk:Vulnerability +
    DefinitionLevel where Likelihood is Very HighIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermVeryHighRiskPrefixrisk
    LabelVery High Risk
    IRIhttps://w3id.org/dpv/risk#VeryHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    -
    -

    Very High Severity

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    exploits vulnerability

    - + - + - + - + - - - - - - - - - - - - + + + + + + + + + + - + - - - - + @@ -26823,18 +34478,15 @@

    Very High Severity

    - + - - - - + - @@ -26843,63 +34495,140 @@

    Very High Severity

    -
    -

    Very Low Likelihood

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    has control

    TermVeryHighSeverityexploitsVulnerability Prefix risk
    LabelVery High Severityexploits vulnerability
    IRIhttps://w3id.org/dpv/risk#VeryHighSeverityhttps://w3id.org/dpv/risk#exploitsVulnerability
    Typerdfs:Class, skos:Concept, dpv:Severityrdf:Property, skos:Concept
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity -
    Object of relation dpv:hasSeverity -
    Domain includes risk:Threat +
    Range includes risk:Vulnerability +
    DefinitionLevel where Severity is Very HighIndicates the threat (subject) exploits the indicated vulnerability (object)
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + + + + @@ -26909,18 +34638,15 @@

    Very Low Likelihood

    - + - - - - + - @@ -26928,63 +34654,50 @@

    Very Low Likelihood

    - -
    -

    Very Low Risk

    +
    +

    has incident

    TermVeryLowLikelihoodhasControl Prefix risk
    LabelVery Low Likelihoodhas control
    IRIhttps://w3id.org/dpv/risk#VeryLowLikelihoodhttps://w3id.org/dpv/risk#hasControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdf:Property, skos:Concept
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    Range includes risk:RiskControl +
    DefinitionLevel where Likelihood is Very LowIndicates the use of specified control
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in DEX
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + @@ -26995,18 +34708,15 @@

    Very Low Risk

    - + - - - - + - @@ -27014,63 +34724,54 @@

    Very Low Risk

    - -
    -

    Very Low Severity

    +
    +

    has risk source

    TermVeryLowRiskhasIncident Prefix risk
    LabelVery Low Riskhas incident
    IRIhttps://w3id.org/dpv/risk#VeryLowRiskhttps://w3id.org/dpv/risk#hasIncident
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdf:Property, skos:Concept
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    Range includes risk:Incident +
    DefinitionLevel where Risk is Very LowIndicates an incident is associated with the specified context
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - - + + + + + + + + + + - + - - - - + @@ -27081,18 +34782,15 @@

    Very Low Severity

    - + - - - - + - @@ -27100,83 +34798,73 @@

    Very Low Severity

    - -
    -

    Violating Code of Conduct

    +
    +

    has threat source

    TermVeryLowSeverityhasRiskSource Prefix risk
    LabelVery Low Severityhas risk source
    IRIhttps://w3id.org/dpv/risk#VeryLowSeverityhttps://w3id.org/dpv/risk#hasRiskSource
    Typerdfs:Class, skos:Concept, dpv:Severityrdf:Property, skos:Concept
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity -
    Object of relation dpv:hasSeverity -
    Domain includes dpv:Risk +
    Range includes risk:RiskSource +
    DefinitionLevel where Severity is Very LowIndicates the risk (subject) has the indicated risk source (object)
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - + - - + + + + + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27184,83 +34872,69 @@

    Violating Code of Conduct

    - -
    -

    Violation of Contractual Obligation

    +
    +

    has vulnerability

    TermViolatingCodeOfConducthasThreatSource Prefix risk
    LabelViolating Code of Conducthas threat source
    IRIhttps://w3id.org/dpv/risk#ViolatingCodeOfConducthttps://w3id.org/dpv/risk#hasThreatSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Threat +
    Range includes risk:ThreatSource +
    DefinitionSomething that acts as or causes Violation of Code of ConductIndicates the threat (subject) has the indicated source (object)
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - + + + + - + - - - - + - - - - - - + + + - + - - - - - - - - + + - @@ -27269,82 +34943,239 @@

    Violation of Contractual Obligation

    -
    -

    Violating Ethics Code

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    is exploited by

    TermViolatingContractualObligationhasVulnerability Prefix risk
    LabelViolation of Contractual Obligationhas vulnerability
    IRIhttps://w3id.org/dpv/risk#ViolatingContractualObligationhttps://w3id.org/dpv/risk#hasVulnerability
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Range includes risk:Vulnerability +
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsIndicates the associated context (subject) has indicated vulnerability (object)
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - - + + + + + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27352,83 +35183,69 @@

    Violating Ethics Code

    - -
    -

    Violation of Legal Obligations

    +
    +

    is vulnerability of

    TermViolatingEthicsCodeisExploitedBy Prefix risk
    LabelViolating Ethics Codeis exploited by
    IRIhttps://w3id.org/dpv/risk#ViolatingEthicsCodehttps://w3id.org/dpv/risk#isExploitedBy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Vulnerability +
    Range includes risk:Threat +
    DefinitionSomething that acts as or causes Violation of Ethics CodeIndicates the vulnerability (subject) is exploited by the indicated threat (object)
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27437,294 +35254,322 @@

    Violation of Legal Obligations

    -
    -

    Violating Policy

    -
    TermViolatingLegalObligationisVulnerabilityOf Prefix risk
    LabelViolation of Legal Obligationsis vulnerability of
    IRIhttps://w3id.org/dpv/risk#ViolatingLegalObligationhttps://w3id.org/dpv/risk#isVulnerabilityOf
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Vulnerability +
    DefinitionSomething that acts as or causes Violation of Legal ObligationsIndicates the vulnerability (subject) is associated with indicated context (object)
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolatingPolicyPrefixrisk
    LabelViolating Policy
    IRIhttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policy
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Violation of Statutory Obligations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolatingStatutoryObligationsPrefixrisk
    LabelViolation of Statutory Obligations
    IRIhttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Violence against children

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolenceAgainstChildrenPrefixrisk
    LabelViolence against children
    IRIhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IndividualRisk -
    DefinitionSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    refers to risk

    - + - + - + - + - - - - - - - - - - + + + + + + + + + - + + + + @@ -27742,19 +35587,178 @@

    Vulnerability

    -
    TermVulnerabilityrefersToRisk Prefix risk
    LabelVulnerabilityrefers to risk
    IRIhttps://w3id.org/dpv/risk#Vulnerabilityhttps://w3id.org/dpv/risk#refersToRisk
    Typerdfs:Class, skos:Conceptrdf:Property, skos:Concept
    Subject of relation risk:isExploitedBy, - risk:isVulnerabilityOf -
    Object of relation risk:causedByVulnerability, - risk:exploitsVulnerability, - risk:hasVulnerability -
    Domain includes dpv:Incident +
    Range includes dpv:Risk +
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskIndicates the incident (subject) is a materialisation of the indicated risk (object)
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    See More: section CORE in RISK + section CORE in DEX
    - -
    -
    -

    Properties

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -27878,7 +35882,6 @@

    Properties

    - @@ -27887,144 +35890,12 @@

    Properties

    -
    -

    caused by threat

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermcausedByThreatPrefixrisk
    Labelcaused by threat
    IRIhttps://w3id.org/dpv/risk#causedByThreat
    Typerdf:Property, skos:Concept
    Range includes risk:Threat -
    DefinitionIndicates the cause of associated context (subject) was the indicated threat (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability -
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28072,8 +35943,6 @@

    caused by vulnerability

    - - @@ -28133,78 +36002,8 @@

    caused by vulnerability

    -
    -

    exploits vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermexploitsVulnerabilityPrefixrisk
    Labelexploits vulnerability
    IRIhttps://w3id.org/dpv/risk#exploitsVulnerability
    Typerdf:Property, skos:Concept
    Domain includes risk:Threat -
    Range includes risk:Vulnerability -
    DefinitionIndicates the threat (subject) exploits the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28255,365 +36054,24 @@

    exploits vulnerability

    -
    -

    has control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasControlPrefixrisk
    Labelhas control
    IRIhttps://w3id.org/dpv/risk#hasControl
    Typerdf:Property, skos:Concept
    Range includes risk:RiskControl -
    DefinitionIndicates the use of specified control
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-02-14
    See More: section CORE in DEX -
    -
    -
    -

    has incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasIncidentPrefixrisk
    Labelhas incident
    IRIhttps://w3id.org/dpv/risk#hasIncident
    Typerdf:Property, skos:Concept
    Range includes risk:Incident -
    DefinitionIndicates an incident is associated with the specified context
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has risk source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasRiskSourcePrefixrisk
    Labelhas risk source
    IRIhttps://w3id.org/dpv/risk#hasRiskSource
    Typerdf:Property, skos:Concept
    Domain includes dpv:Risk -
    Range includes risk:RiskSource -
    DefinitionIndicates the risk (subject) has the indicated risk source (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has threat source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasThreatSourcePrefixrisk
    Labelhas threat source
    IRIhttps://w3id.org/dpv/risk#hasThreatSource
    Typerdf:Property, skos:Concept
    Domain includes risk:Threat -
    Range includes risk:ThreatSource -
    DefinitionIndicates the threat (subject) has the indicated source (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasVulnerabilityPrefixrisk
    Labelhas vulnerability
    IRIhttps://w3id.org/dpv/risk#hasVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability -
    DefinitionIndicates the associated context (subject) has indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28646,8 +36104,6 @@

    has vulnerability

    - - @@ -28727,148 +36183,12 @@

    has vulnerability

    -
    -

    is exploited by

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermisExploitedByPrefixrisk
    Labelis exploited by
    IRIhttps://w3id.org/dpv/risk#isExploitedBy
    Typerdf:Property, skos:Concept
    Domain includes risk:Vulnerability -
    Range includes risk:Threat -
    DefinitionIndicates the vulnerability (subject) is exploited by the indicated threat (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    is vulnerability of

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermisVulnerabilityOfPrefixrisk
    Labelis vulnerability of
    IRIhttps://w3id.org/dpv/risk#isVulnerabilityOf
    Typerdf:Property, skos:Concept
    Domain includes risk:Vulnerability -
    DefinitionIndicates the vulnerability (subject) is associated with indicated context (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -29003,114 +36323,145 @@

    is vulnerability of

    -
    -

    refers to risk

    - - - - - - - - - - - - - - - - - - - - - - - - + +
    +

    DPV uses the following terms from [[RDF]] and [[RDFS]] with their defined meanings:

    +
      +
    • rdf:type to denote a concept is an instance of another concept
    • +
    • rdfs:Class to denote a concept is a Class or a category
    • +
    • rdfs:subClassOf to specify the concept is a subclass (subtype, sub-category, subset) of another concept
    • +
    • rdf:Property to denote a concept is a property or a relation
    • +
    +

    The following external concepts are re-used within DPV:

    +

    External

    + + - -
    - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - -
    TermrefersToRiskPrefixrisk
    Labelrefers to risk
    IRIhttps://w3id.org/dpv/risk#refersToRisk
    Typerdf:Property, skos:Concept
    Domain includes dpv:Incident -
    Range includes dpv:Risk -
    DefinitionIndicates the incident (subject) is a materialisation of the indicated risk (object)
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-14
    See More: section CORE in DEX -
    -
    + + + + + + + + + + + + + + + @@ -29118,70 +36469,88 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + @@ -29190,64 +36559,82 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + @@ -29256,405 +36643,433 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - -
    -
    -

    DPV uses the following terms from [[RDF]] and [[RDFS]] with their defined meanings:

    -
      -
    • rdf:type to denote a concept is an instance of another concept
    • -
    • rdfs:Class to denote a concept is a Class or a category
    • -
    • rdfs:subClassOf to specify the concept is a subclass (subtype, sub-category, subset) of another concept
    • -
    • rdf:Property to denote a concept is a property or a relation
    • -
    -

    The following external concepts are re-used within DPV:

    -

    External

    - + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + - + @@ -29669,58 +37084,47 @@

    External

    - - - - - - - - + - - - - - + - + @@ -29737,6 +37141,7 @@

    External

    + @@ -29752,138 +37157,134 @@

    External

    - - - - - + - + - - - - + - - - + - - + - + - + + + - + - + - - + + + + + + + + - - - + @@ -29901,59 +37302,99 @@

    External

    - - - - + - - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -29976,6 +37417,7 @@

    External

    + @@ -29984,7 +37426,6 @@

    External

    - @@ -30120,6 +37561,7 @@

    External

    + @@ -30159,17 +37601,11 @@

    External

    - - - - - - @@ -30185,6 +37621,7 @@

    External

    + @@ -30218,88 +37655,86 @@

    External

    - + - - + - + - - - - + - - - - + + + + + + - + - + - + - + - + @@ -30308,31 +37743,31 @@

    External

    - + - + - + - + - + @@ -30341,220 +37776,178 @@

    External

    - - + - + - - - - + - - - + + - + - - - - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - + - - - - + - - + - - - @@ -30578,22 +37971,37 @@

    External

    + + + + + + + + + + + + + + + @@ -30634,5 +38042,69 @@

    Funding Acknowledgements for Contributors

    + \ No newline at end of file diff --git a/2.1-dev/risk/modules/bias-owl.jsonld b/2.1-dev/risk/modules/bias-owl.jsonld deleted file mode 100644 index 1f52bd50e..000000000 --- a/2.1-dev/risk/modules/bias-owl.jsonld +++ /dev/null @@ -1,1624 +0,0 @@ -[ - { - "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Informativeness Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Non-Response Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Non-Normality Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Simpson'S Paradox Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when data records are not collected randomly from the intended population" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Sampling Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Data Aggregation Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 20501:2019" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Statistical Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Coverage Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Bias", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Group Attribution Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Data Processing Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#", - "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Rob Brennan" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/hasVersion": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ - { - "@id": "https://www.w3.org/copyright/document-license-2023/" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@language": "en", - "@value": "2024-08-18" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ - { - "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "https://w3id.org/dpv/owl" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://xmlns.com/foaf/0.1/logo": [ - { - "@id": "https://w3id.org/dpv/media/logo.png" - } - ], - "https://schema.org/version": [ - { - "@value": "2.1-dev" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Bias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Data Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Implicit Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Out-Group Homogeneity Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "In-Group Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Confirmation Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Confounding Variables Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Societal Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Rule-Based System Design" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Bias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when humans are processing and interpreting information" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cognitive Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs in or during requirements creation" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Requirements Bias" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Selection Bias" - } - ] - } -] \ No newline at end of file diff --git a/2.1-dev/risk/modules/bias-owl.n3 b/2.1-dev/risk/modules/bias-owl.n3 deleted file mode 100644 index 6e4b014c8..000000000 --- a/2.1-dev/risk/modules/bias-owl.n3 +++ /dev/null @@ -1,382 +0,0 @@ -@prefix bibo: . -@prefix dct: . -@prefix foaf: . -@prefix owl: . -@prefix profile: . -@prefix rdf: . -@prefix rdfs: . -@prefix risk-owl: . -@prefix role: . -@prefix schema: . -@prefix skos: . -@prefix sw: . -@prefix vann: . -@prefix xsd: . - -risk-owl:Bias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; - skos:prefLabel "Bias"@en . - -risk-owl:CognitiveBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Bias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; - skos:prefLabel "Cognitive Bias"@en . - -risk-owl:ConfirmationBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; - skos:prefLabel "Confirmation Bias"@en . - -risk-owl:ConfoundingVariablesBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:StatisticalBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; - skos:prefLabel "Confounding Variables Bias"@en . - -risk-owl:CoverageBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SelectionBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; - skos:prefLabel "Coverage Bias"@en . - -risk-owl:DataAggregationBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; - skos:prefLabel "Data Aggregation Bias"@en . - -risk-owl:DataBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Bias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; - skos:prefLabel "Data Bias"@en . - -risk-owl:DataProcessingBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; - skos:prefLabel "Data Processing Bias"@en . - -risk-owl:GroupAttributionBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; - skos:prefLabel "Group Attribution Bias"@en . - -risk-owl:ImplicitBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; - skos:prefLabel "Implicit Bias"@en . - -risk-owl:InGroupBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; - skos:prefLabel "In-Group Bias"@en . - -risk-owl:InformativenessBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:EngineeringDecisionBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; - skos:prefLabel "Informativeness Bias"@en . - -risk-owl:NonNormalityBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:StatisticalBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; - skos:prefLabel "Non-Normality Bias"@en . - -risk-owl:NonResponseBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SelectionBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; - skos:prefLabel "Non-Response Bias"@en . - -risk-owl:OutGroupHomogeneityBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; - skos:prefLabel "Out-Group Homogeneity Bias"@en . - -risk-owl:RequirementsBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs in or during requirements creation"@en ; - skos:prefLabel "Requirements Bias"@en ; - skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . - -risk-owl:RuleBasedSystemDesign a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; - skos:prefLabel "Rule-Based System Design"@en ; - skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . - -risk-owl:SamplingBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SelectionBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; - skos:prefLabel "Sampling Bias"@en . - -risk-owl:SelectionBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:StatisticalBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; - skos:prefLabel "Selection Bias"@en . - -risk-owl:SimpsonsParadoxBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; - skos:prefLabel "Simpson'S Paradox Bias"@en . - -risk-owl:SocietalBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; - skos:prefLabel "Societal Bias"@en . - -risk-owl:StatisticalBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO 20501:2019"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; - skos:prefLabel "Statistical Bias"@en . - -risk-owl:serialisation-html a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - HTML serialiation" ; - profile:hasArtifact ; - profile:hasRole role:specification . - -risk-owl:serialisation-jsonld a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - JSON-LD serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk-owl:serialisation-n3 a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - N3 serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk-owl:serialisation-rdf a profile:ResourceDescriptor ; - dct:conformsTo rdf: ; - dct:format ; - dct:title "Risk Concepts - RDF/XML serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk-owl:serialisation-ttl a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - Turtle serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Examples for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Guides for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Primer for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - -risk-owl: a owl:Ontology, - profile:Profile ; - dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; - dct:conformsTo , - "http://www.w3.org/2000/01/rdf-schema", - "http://www.w3.org/2004/02/skos/core" ; - dct:contributor "Daniel Doherty" ; - dct:created "2022-08-14"@en ; - dct:creator "Beatriz Esteves"@en, - "Delaram Golpayegani"@en, - "Georg P. Krog"@en, - "Harshvardhan J. Pandit"@en, - "Julian Flake"@en, - "Paul Ryan"@en, - "Rob Brennan"@en ; - dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"@en ; - dct:hasVersion risk-owl: ; - dct:identifier "https://w3id.org/dpv/risk" ; - dct:issued "2022-08-14"@en ; - dct:license ; - dct:modified "2024-08-18"@en ; - dct:publisher ; - dct:source ; - dct:title "Risk Concepts"@en ; - bibo:doi "10.5281/zenodo.12505841" ; - bibo:status "http://purl.org/ontology/bibo/status/published" ; - vann:preferredNamespacePrefix "risk" ; - vann:preferredNamespaceUri "https://w3id.org/dpv/risk#" ; - rdfs:Label "RISK"@en ; - owl:versionIRI ; - owl:versionInfo "2.1-dev" ; - profile:hasResource , - , - , - risk-owl:serialisation-html, - risk-owl:serialisation-jsonld, - risk-owl:serialisation-n3, - risk-owl:serialisation-rdf, - risk-owl:serialisation-ttl ; - profile:isProfileOf , - , - risk-owl: ; - foaf:logo ; - schema:version "2.1-dev" . - diff --git a/2.1-dev/risk/modules/bias-owl.rdf b/2.1-dev/risk/modules/bias-owl.rdf deleted file mode 100644 index c3db9e9c1..000000000 --- a/2.1-dev/risk/modules/bias-owl.rdf +++ /dev/null @@ -1,413 +0,0 @@ - - - - Confirmation Bias - ISO/IEC 24027:2021 - - - - 2024-09-13 - - Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - accepted - Daniel Doherty - - - - - Risk Concepts - Turtle serialiation - - - - - - - - - - ISO/IEC 24027:2021 - - Group Attribution Bias - 2024-09-13 - Daniel Doherty - accepted - Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - - - - accepted - Daniel Doherty - - Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - Confounding Variables Bias - 2024-09-13 - - - - ISO/IEC 24027:2021 - - - - - - - - accepted - Bias that occurs when a human makes an association or assumption based on their mental models and memories - Daniel Doherty - 2024-09-13 - ISO/IEC 24027:2021 - Implicit Bias - - - - Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - - - - accepted - Daniel Doherty - 2024-09-13 - ISO/IEC 24027:2021 - Societal Bias - - - - - ISO/IEC 24027:2021 - - - - Daniel Doherty - accepted - - 2024-09-13 - Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - Data Processing Bias - - - - accepted - 2024-09-13 - Daniel Doherty - ISO/IEC 24027:2021 - - - - Bias that occurs when humans are processing and interpreting information - Cognitive Bias - - - - - - - - - Risk Concepts - N3 serialiation - - - - Daniel Doherty - accepted - - - - ISO/IEC 24027:2021 - Coverage Bias - Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - - 2024-09-13 - - - - - - - - - - - - - http://www.w3.org/2000/01/rdf-schema - - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - 2.1-dev - - - - https://w3id.org/dpv/risk - 2.1-dev - RISK - Daniel Doherty - - Beatriz Esteves - Julian Flake - Paul Ryan - Delaram Golpayegani - Harshvardhan J. Pandit - Georg P. Krog - Rob Brennan - - https://w3id.org/dpv/risk# - - - - 2022-08-14 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Risk Concepts - - 2024-08-18 - risk - - http://purl.org/ontology/bibo/status/published - 2022-08-14 - - - 2024-09-13 - accepted - Daniel Doherty - - - - ISO/IEC 24027:2021 - Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - Non-Normality Bias - - - - - ISO/IEC 24027:2021 - - - - Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - Non-Response Bias - 2024-09-13 - - accepted - Daniel Doherty - - - - Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - 2024-09-13 - accepted - - - - Daniel Doherty - ISO/IEC 24027:2021 - Selection Bias - - - - - Sampling Bias - - - - - 2024-09-13 - accepted - Daniel Doherty - Bias that occurs when data records are not collected randomly from the intended population - ISO/IEC 24027:2021 - - - - - - - ISO/IEC 24027:2021 - Data Aggregation Bias - - 2024-09-13 - accepted - Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - Daniel Doherty - - - - Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - - - - ISO/IEC 24027:2021 - Out-Group Homogeneity Bias - Daniel Doherty - - 2024-09-13 - accepted - - - - - - - Daniel Doherty - ISO/IEC 24027:2021 - Simpson'S Paradox Bias - Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - 2024-09-13 - - accepted - - - - - - - - Risk Concepts - JSON-LD serialiation - - - - - - - Daniel Doherty - Rule-Based System Design - - 2024-09-13 - accepted - Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - ISO/IEC 24027:2021 - Rule based system design also potentially introduces various forms of human cognitive bias - - - - ISO/IEC 24027:2021 - - - - Bias - - 2024-09-13 - accepted - Daniel Doherty - Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - - - - Daniel Doherty - Statistical Bias - - - - ISO 20501:2019 - 2024-09-13 - - accepted - Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - - - - - - Risk Concepts - HTML serialiation - - - - - - - - - - - Guides for Data Privacy Vocabulary - - - - - - - Primer for Data Privacy Vocabulary - - - - Bias that occurs in or during requirements creation - - - - - Requirements Bias - accepted - Requirements bias also represents occasions for the human cognitive biases to manifest - Daniel Doherty - 2024-09-13 - ISO/IEC 24027:2021 - - - - - - - Examples for Data Privacy Vocabulary - - - - - - 2024-09-13 - Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - - - - Daniel Doherty - accepted - ISO/IEC 24027:2021 - Data Bias - - - - - - - In-Group Bias - ISO/IEC 24027:2021 - - 2024-09-13 - Bias that occurs when showing partiality to one's own group or own characteristics - Daniel Doherty - accepted - - - - - Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - 2024-09-13 - Daniel Doherty - accepted - Informativeness Bias - - - - ISO/IEC 24027:2021 - - - - - - Risk Concepts - RDF/XML serialiation - - - - - diff --git a/2.1-dev/risk/modules/bias-owl.ttl b/2.1-dev/risk/modules/bias-owl.ttl deleted file mode 100644 index 6e4b014c8..000000000 --- a/2.1-dev/risk/modules/bias-owl.ttl +++ /dev/null @@ -1,382 +0,0 @@ -@prefix bibo: . -@prefix dct: . -@prefix foaf: . -@prefix owl: . -@prefix profile: . -@prefix rdf: . -@prefix rdfs: . -@prefix risk-owl: . -@prefix role: . -@prefix schema: . -@prefix skos: . -@prefix sw: . -@prefix vann: . -@prefix xsd: . - -risk-owl:Bias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; - skos:prefLabel "Bias"@en . - -risk-owl:CognitiveBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Bias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; - skos:prefLabel "Cognitive Bias"@en . - -risk-owl:ConfirmationBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; - skos:prefLabel "Confirmation Bias"@en . - -risk-owl:ConfoundingVariablesBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:StatisticalBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; - skos:prefLabel "Confounding Variables Bias"@en . - -risk-owl:CoverageBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SelectionBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; - skos:prefLabel "Coverage Bias"@en . - -risk-owl:DataAggregationBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; - skos:prefLabel "Data Aggregation Bias"@en . - -risk-owl:DataBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:Bias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; - skos:prefLabel "Data Bias"@en . - -risk-owl:DataProcessingBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; - skos:prefLabel "Data Processing Bias"@en . - -risk-owl:GroupAttributionBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; - skos:prefLabel "Group Attribution Bias"@en . - -risk-owl:ImplicitBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; - skos:prefLabel "Implicit Bias"@en . - -risk-owl:InGroupBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; - skos:prefLabel "In-Group Bias"@en . - -risk-owl:InformativenessBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:EngineeringDecisionBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; - skos:prefLabel "Informativeness Bias"@en . - -risk-owl:NonNormalityBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:StatisticalBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; - skos:prefLabel "Non-Normality Bias"@en . - -risk-owl:NonResponseBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SelectionBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; - skos:prefLabel "Non-Response Bias"@en . - -risk-owl:OutGroupHomogeneityBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; - skos:prefLabel "Out-Group Homogeneity Bias"@en . - -risk-owl:RequirementsBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs in or during requirements creation"@en ; - skos:prefLabel "Requirements Bias"@en ; - skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . - -risk-owl:RuleBasedSystemDesign a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; - skos:prefLabel "Rule-Based System Design"@en ; - skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . - -risk-owl:SamplingBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SelectionBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; - skos:prefLabel "Sampling Bias"@en . - -risk-owl:SelectionBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:StatisticalBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; - skos:prefLabel "Selection Bias"@en . - -risk-owl:SimpsonsParadoxBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; - skos:prefLabel "Simpson'S Paradox Bias"@en . - -risk-owl:SocietalBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:CognitiveBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; - skos:prefLabel "Societal Bias"@en . - -risk-owl:StatisticalBias a rdfs:Class, - owl:Class, - risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO 20501:2019"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBias ; - sw:term_status "accepted"@en ; - skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; - skos:prefLabel "Statistical Bias"@en . - -risk-owl:serialisation-html a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - HTML serialiation" ; - profile:hasArtifact ; - profile:hasRole role:specification . - -risk-owl:serialisation-jsonld a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - JSON-LD serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk-owl:serialisation-n3 a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - N3 serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk-owl:serialisation-rdf a profile:ResourceDescriptor ; - dct:conformsTo rdf: ; - dct:format ; - dct:title "Risk Concepts - RDF/XML serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk-owl:serialisation-ttl a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - Turtle serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Examples for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Guides for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Primer for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - -risk-owl: a owl:Ontology, - profile:Profile ; - dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; - dct:conformsTo , - "http://www.w3.org/2000/01/rdf-schema", - "http://www.w3.org/2004/02/skos/core" ; - dct:contributor "Daniel Doherty" ; - dct:created "2022-08-14"@en ; - dct:creator "Beatriz Esteves"@en, - "Delaram Golpayegani"@en, - "Georg P. Krog"@en, - "Harshvardhan J. Pandit"@en, - "Julian Flake"@en, - "Paul Ryan"@en, - "Rob Brennan"@en ; - dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"@en ; - dct:hasVersion risk-owl: ; - dct:identifier "https://w3id.org/dpv/risk" ; - dct:issued "2022-08-14"@en ; - dct:license ; - dct:modified "2024-08-18"@en ; - dct:publisher ; - dct:source ; - dct:title "Risk Concepts"@en ; - bibo:doi "10.5281/zenodo.12505841" ; - bibo:status "http://purl.org/ontology/bibo/status/published" ; - vann:preferredNamespacePrefix "risk" ; - vann:preferredNamespaceUri "https://w3id.org/dpv/risk#" ; - rdfs:Label "RISK"@en ; - owl:versionIRI ; - owl:versionInfo "2.1-dev" ; - profile:hasResource , - , - , - risk-owl:serialisation-html, - risk-owl:serialisation-jsonld, - risk-owl:serialisation-n3, - risk-owl:serialisation-rdf, - risk-owl:serialisation-ttl ; - profile:isProfileOf , - , - risk-owl: ; - foaf:logo ; - schema:version "2.1-dev" . - diff --git a/2.1-dev/risk/modules/bias.csv b/2.1-dev/risk/modules/bias.csv deleted file mode 100644 index bb50af9b3..000000000 --- a/2.1-dev/risk/modules/bias.csv +++ /dev/null @@ -1,23 +0,0 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#RiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk -CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk -ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk -RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk -SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/bias.jsonld b/2.1-dev/risk/modules/bias.jsonld deleted file mode 100644 index 8a60f38b6..000000000 --- a/2.1-dev/risk/modules/bias.jsonld +++ /dev/null @@ -1,1732 +0,0 @@ -[ - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Out-Group Homogeneity Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SamplingBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SelectionBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when data records are not collected randomly from the intended population" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Sampling Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Bias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when humans are processing and interpreting information" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cognitive Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SelectionBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Selection Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Group Attribution Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#bias-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RequirementsBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs in or during requirements creation" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Requirements Bias" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DataProcessingBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#DataBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Data Processing Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#NonNormalityBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Non-Normality Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.n3" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#InformativenessBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Informativeness Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#NonResponseBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SelectionBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Non-Response Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DataAggregationBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#DataBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Data Aggregation Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ImplicitBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Implicit Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DataBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Bias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Data Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk", - "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ - { - "@id": "https://www.w3.org/copyright/document-license-2023/" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@language": "en", - "@value": "2024-08-18" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ - { - "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, - { - "@id": "https://w3id.org/dpv" - } - ], - "http://xmlns.com/foaf/0.1/logo": [ - { - "@id": "https://w3id.org/dpv/media/logo.png" - } - ], - "https://schema.org/version": [ - { - "@value": "2.1-dev" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.rdf" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SocietalBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Societal Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#InGroupBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "In-Group Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Confounding Variables Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Rule-Based System Design" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CoverageBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SelectionBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Coverage Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ConfirmationBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Confirmation Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#DataBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Simpson'S Paradox Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#StatisticalBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 20501:2019" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#DataBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Statistical Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Bias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#bias-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Bias" - } - ] - } -] \ No newline at end of file diff --git a/2.1-dev/risk/modules/bias.n3 b/2.1-dev/risk/modules/bias.n3 deleted file mode 100644 index 8e0bde8af..000000000 --- a/2.1-dev/risk/modules/bias.n3 +++ /dev/null @@ -1,404 +0,0 @@ -@prefix bibo: . -@prefix dct: . -@prefix foaf: . -@prefix owl: . -@prefix profile: . -@prefix rdf: . -@prefix rdfs: . -@prefix risk: . -@prefix role: . -@prefix schema: . -@prefix skos: . -@prefix sw: . -@prefix vann: . -@prefix xsd: . - -risk:Bias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept ; - skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Bias"@en . - -risk:CognitiveBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Bias ; - skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Cognitive Bias"@en . - -risk:ConfirmationBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Confirmation Bias"@en . - -risk:ConfoundingVariablesBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:StatisticalBias ; - skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Confounding Variables Bias"@en . - -risk:CoverageBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:SelectionBias ; - skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Coverage Bias"@en . - -risk:DataAggregationBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:DataBias ; - skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Data Aggregation Bias"@en . - -risk:DataBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Bias ; - skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Data Bias"@en . - -risk:DataProcessingBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:DataBias ; - skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Data Processing Bias"@en . - -risk:GroupAttributionBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Group Attribution Bias"@en . - -risk:ImplicitBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Implicit Bias"@en . - -risk:InGroupBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "In-Group Bias"@en . - -risk:InformativenessBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:EngineeringDecisionBias ; - skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Informativeness Bias"@en . - -risk:NonNormalityBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:StatisticalBias ; - skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Non-Normality Bias"@en . - -risk:NonResponseBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:SelectionBias ; - skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Non-Response Bias"@en . - -risk:OutGroupHomogeneityBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Out-Group Homogeneity Bias"@en . - -risk:RequirementsBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs in or during requirements creation"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Requirements Bias"@en ; - skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . - -risk:RuleBasedSystemDesign a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Rule-Based System Design"@en ; - skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . - -risk:SamplingBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:SelectionBias ; - skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Sampling Bias"@en . - -risk:SelectionBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:StatisticalBias ; - skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Selection Bias"@en . - -risk:SimpsonsParadoxBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:DataBias ; - skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Simpson'S Paradox Bias"@en . - -risk:SocietalBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Societal Bias"@en . - -risk:StatisticalBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO 20501:2019"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:DataBias ; - skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Statistical Bias"@en . - - a owl:Ontology, - profile:Profile ; - dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; - dct:conformsTo "http://www.w3.org/2000/01/rdf-schema", - "http://www.w3.org/2004/02/skos/core" ; - dct:contributor "Daniel Doherty" ; - dct:created "2022-08-14"@en ; - dct:creator "Beatriz Esteves"@en, - "Delaram Golpayegani"@en, - "Georg P. Krog"@en, - "Harshvardhan J. Pandit"@en, - "Julian Flake"@en, - "Paul Ryan"@en, - "Rob Brennan"@en ; - dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"@en ; - dct:identifier "https://w3id.org/dpv/risk" ; - dct:issued "2022-08-14"@en ; - dct:license ; - dct:modified "2024-08-18"@en ; - dct:publisher ; - dct:source ; - dct:title "Risk Concepts"@en ; - bibo:doi "10.5281/zenodo.12505841" ; - bibo:status "http://purl.org/ontology/bibo/status/published" ; - vann:preferredNamespacePrefix "risk" ; - vann:preferredNamespaceUri "https://w3id.org/dpv/risk#" ; - rdfs:Label "RISK"@en ; - owl:versionIRI ; - owl:versionInfo "2.1-dev" ; - profile:hasResource , - , - , - risk:serialisation-html, - risk:serialisation-jsonld, - risk:serialisation-n3, - risk:serialisation-rdf, - risk:serialisation-ttl ; - profile:isProfileOf rdfs:, - skos:, - ; - foaf:logo ; - schema:version "2.1-dev" . - -risk:serialisation-html a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - HTML serialiation" ; - profile:hasArtifact ; - profile:hasRole role:specification . - -risk:serialisation-jsonld a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - JSON-LD serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk:serialisation-n3 a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - N3 serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk:serialisation-rdf a profile:ResourceDescriptor ; - dct:conformsTo rdf: ; - dct:format ; - dct:title "Risk Concepts - RDF/XML serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk:serialisation-ttl a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - Turtle serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Examples for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Guides for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Primer for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - -risk:bias-classes a skos:ConceptScheme . - diff --git a/2.1-dev/risk/modules/bias.rdf b/2.1-dev/risk/modules/bias.rdf deleted file mode 100644 index 9f9d38289..000000000 --- a/2.1-dev/risk/modules/bias.rdf +++ /dev/null @@ -1,436 +0,0 @@ - - - - - - - Simpson'S Paradox Bias - Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Confounding Variables Bias - Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-08-18 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - Daniel Doherty - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - - - - - - - Non-Normality Bias - Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - - - Risk Concepts - N3 serialiation - - - - - - Implicit Bias - Bias that occurs when a human makes an association or assumption based on their mental models and memories - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Selection Bias - Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Statistical Bias - Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - - ISO 20501:2019 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Confirmation Bias - Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Bias - Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Out-Group Homogeneity Bias - Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Rule-Based System Design - Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - - Rule based system design also potentially introduces various forms of human cognitive bias - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Societal Bias - Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Coverage Bias - Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Informativeness Bias - Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Data Processing Bias - Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - In-Group Bias - Bias that occurs when showing partiality to one's own group or own characteristics - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Non-Response Bias - Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Data Bias - Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Cognitive Bias - Bias that occurs when humans are processing and interpreting information - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Data Aggregation Bias - Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - - - Risk Concepts - Turtle serialiation - - - - - - Sampling Bias - Bias that occurs when data records are not collected randomly from the intended population - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - Requirements Bias - Bias that occurs in or during requirements creation - - Requirements bias also represents occasions for the human cognitive biases to manifest - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - - - Risk Concepts - HTML serialiation - - - - - - Guides for Data Privacy Vocabulary - - - - - - - - Primer for Data Privacy Vocabulary - - - - - - - - Group Attribution Bias - Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - - - - - - - Risk Concepts - JSON-LD serialiation - - - - - - Examples for Data Privacy Vocabulary - - - - - - - - - - Risk Concepts - RDF/XML serialiation - - - - - diff --git a/2.1-dev/risk/modules/bias.ttl b/2.1-dev/risk/modules/bias.ttl deleted file mode 100644 index 8e0bde8af..000000000 --- a/2.1-dev/risk/modules/bias.ttl +++ /dev/null @@ -1,404 +0,0 @@ -@prefix bibo: . -@prefix dct: . -@prefix foaf: . -@prefix owl: . -@prefix profile: . -@prefix rdf: . -@prefix rdfs: . -@prefix risk: . -@prefix role: . -@prefix schema: . -@prefix skos: . -@prefix sw: . -@prefix vann: . -@prefix xsd: . - -risk:Bias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept ; - skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Bias"@en . - -risk:CognitiveBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Bias ; - skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Cognitive Bias"@en . - -risk:ConfirmationBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Confirmation Bias"@en . - -risk:ConfoundingVariablesBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:StatisticalBias ; - skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Confounding Variables Bias"@en . - -risk:CoverageBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:SelectionBias ; - skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Coverage Bias"@en . - -risk:DataAggregationBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:DataBias ; - skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Data Aggregation Bias"@en . - -risk:DataBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:Bias ; - skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Data Bias"@en . - -risk:DataProcessingBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:DataBias ; - skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Data Processing Bias"@en . - -risk:GroupAttributionBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Group Attribution Bias"@en . - -risk:ImplicitBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Implicit Bias"@en . - -risk:InGroupBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "In-Group Bias"@en . - -risk:InformativenessBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:EngineeringDecisionBias ; - skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Informativeness Bias"@en . - -risk:NonNormalityBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:StatisticalBias ; - skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Non-Normality Bias"@en . - -risk:NonResponseBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:SelectionBias ; - skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Non-Response Bias"@en . - -risk:OutGroupHomogeneityBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Out-Group Homogeneity Bias"@en . - -risk:RequirementsBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs in or during requirements creation"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Requirements Bias"@en ; - skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . - -risk:RuleBasedSystemDesign a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Rule-Based System Design"@en ; - skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . - -risk:SamplingBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:SelectionBias ; - skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Sampling Bias"@en . - -risk:SelectionBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:StatisticalBias ; - skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Selection Bias"@en . - -risk:SimpsonsParadoxBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:DataBias ; - skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Simpson'S Paradox Bias"@en . - -risk:SocietalBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO/IEC 24027:2021"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:CognitiveBias ; - skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Societal Bias"@en . - -risk:StatisticalBias a rdfs:Class, - skos:Concept, - risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; - dct:created "2024-09-13"^^xsd:date ; - dct:source "ISO 20501:2019"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:DataBias ; - skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; - skos:inScheme risk:bias-classes ; - skos:prefLabel "Statistical Bias"@en . - - a owl:Ontology, - profile:Profile ; - dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; - dct:conformsTo "http://www.w3.org/2000/01/rdf-schema", - "http://www.w3.org/2004/02/skos/core" ; - dct:contributor "Daniel Doherty" ; - dct:created "2022-08-14"@en ; - dct:creator "Beatriz Esteves"@en, - "Delaram Golpayegani"@en, - "Georg P. Krog"@en, - "Harshvardhan J. Pandit"@en, - "Julian Flake"@en, - "Paul Ryan"@en, - "Rob Brennan"@en ; - dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"@en ; - dct:identifier "https://w3id.org/dpv/risk" ; - dct:issued "2022-08-14"@en ; - dct:license ; - dct:modified "2024-08-18"@en ; - dct:publisher ; - dct:source ; - dct:title "Risk Concepts"@en ; - bibo:doi "10.5281/zenodo.12505841" ; - bibo:status "http://purl.org/ontology/bibo/status/published" ; - vann:preferredNamespacePrefix "risk" ; - vann:preferredNamespaceUri "https://w3id.org/dpv/risk#" ; - rdfs:Label "RISK"@en ; - owl:versionIRI ; - owl:versionInfo "2.1-dev" ; - profile:hasResource , - , - , - risk:serialisation-html, - risk:serialisation-jsonld, - risk:serialisation-n3, - risk:serialisation-rdf, - risk:serialisation-ttl ; - profile:isProfileOf rdfs:, - skos:, - ; - foaf:logo ; - schema:version "2.1-dev" . - -risk:serialisation-html a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - HTML serialiation" ; - profile:hasArtifact ; - profile:hasRole role:specification . - -risk:serialisation-jsonld a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - JSON-LD serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk:serialisation-n3 a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - N3 serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk:serialisation-rdf a profile:ResourceDescriptor ; - dct:conformsTo rdf: ; - dct:format ; - dct:title "Risk Concepts - RDF/XML serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - -risk:serialisation-ttl a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Risk Concepts - Turtle serialiation" ; - profile:hasArtifact ; - profile:hasRole role:vocabulary . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Examples for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Guides for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - - a profile:ResourceDescriptor ; - dct:conformsTo ; - dct:format ; - dct:title "Primer for Data Privacy Vocabulary" ; - profile:hasArtifact ; - profile:hasRole role:guidance . - -risk:bias-classes a skos:ConceptScheme . - diff --git a/2.1-dev/risk/modules/core-owl.jsonld b/2.1-dev/risk/modules/core-owl.jsonld index 4d9766b45..ada386d6e 100644 --- a/2.1-dev/risk/modules/core-owl.jsonld +++ b/2.1-dev/risk/modules/core-owl.jsonld @@ -46,12 +46,68 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk/owl#hasControl", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the use of specified control" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ { "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } @@ -76,67 +132,577 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "exploits vulnerability" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates a concept can potentially be a 'consequence concept within an use-case" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Potential Consequence" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "is exploited by" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Analysis" + } + ] + }, + { + "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PotentialRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates a concept can potentially be a 'risk' concept within an use-case" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Potential Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0070" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "An actual or occured event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Incident is realised or materialised risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAssessment", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3a914addd1624a6ab69826c81a0b0778" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Matrix" + } + ] + }, + { + "@id": "_:N3a914addd1624a6ab69826c81a0b0778", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ { - "@language": "en", - "@value": "is vulnerability of" + "@value": "IEC 31010:2019" } ], - "https://schema.org/domainIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Threat Source" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], "http://purl.org/dc/terms/bibliographicCitation": [ { @@ -145,10 +711,10 @@ ], "http://purl.org/dc/terms/conformsTo": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" + "@value": "http://www.w3.org/2004/02/skos/core" }, { - "@value": "http://www.w3.org/2004/02/skos/core" + "@value": "http://www.w3.org/2000/01/rdf-schema" }, { "@id": "http://www.w3.org/2002/07/owl" @@ -156,16 +722,16 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan" + "@value": "Harshvardhan J. Pandit" }, { - "@value": "Delaram Golpayegani" + "@value": "Julio Fernandez" }, { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan" }, { - "@value": "Julio Fernandez" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ @@ -177,31 +743,31 @@ "http://purl.org/dc/terms/creator": [ { "@language": "en", - "@value": "Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" }, { "@language": "en", - "@value": "Georg P. Krog" + "@value": "Julian Flake" }, { "@language": "en", - "@value": "Paul Ryan" + "@value": "Delaram Golpayegani" }, { "@language": "en", - "@value": "Harshvardhan J. Pandit" + "@value": "Beatriz Esteves" }, { "@language": "en", - "@value": "Julian Flake" + "@value": "Rob Brennan" }, { "@language": "en", - "@value": "Delaram Golpayegani" + "@value": "Georg P. Krog" }, { "@language": "en", - "@value": "Rob Brennan" + "@value": "Paul Ryan" } ], "http://purl.org/dc/terms/description": [ @@ -294,16 +860,16 @@ "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + "@id": "https://w3id.org/dpv/examples" }, { "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" }, { - "@id": "https://w3id.org/dpv/examples" + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" }, { "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" @@ -338,20 +904,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -359,81 +915,10 @@ "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Threat", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -443,7 +928,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -455,61 +940,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#hasIncident", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://purl.org/dc/terms/created": [ @@ -532,82 +981,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@language": "en", - "@value": "has risk source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@language": "en", + "@value": "has incident" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/rangeIncludes": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasControl", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-29" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -619,62 +1032,58 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" + "@value": "Confidentiality Concept" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@language": "en", + "@value": "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasIncident", + "@id": "https://w3id.org/dpv/risk/owl#Threat", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -687,6 +1096,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -696,54 +1110,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-06-12" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", + "@id": "https://w3id.org/dpv/risk/owl#RiskSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -751,13 +1176,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -767,7 +1192,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -779,56 +1204,71 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Source of threat event, including both agent and non-agent sources" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ], "http://purl.org/dc/terms/created": [ @@ -851,18 +1291,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" + "@value": "has threat source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ] }, @@ -913,21 +1358,51 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -949,70 +1424,96 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Integrity Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Guides for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@id": "https://w3id.org/dpv/guides" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAssessment", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5faf38fbf04547d78ccaa2b8c1043b41" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1020,7 +1521,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1032,34 +1533,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:N5faf38fbf04547d78ccaa2b8c1043b41", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", + "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" @@ -1069,11 +1554,6 @@ "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -1094,36 +1574,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" + "@value": "is vulnerability of" } ], "https://schema.org/domainIncludes": [ { "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1133,7 +1613,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1145,30 +1625,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "Indicates a concept is relevant to 'Availability' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Availability Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -1191,28 +1672,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "has vulnerability" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk/owl#PotentialImpact", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -1225,12 +1701,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8c7d07a332384427aa20629b184e287b" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1240,7 +1711,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1252,48 +1723,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Indicates a concept can potentially be a 'impact' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:N8c7d07a332384427aa20629b184e287b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" + "@value": "Potential Impact" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@language": "en", + "@value": "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@id": "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1303,7 +1763,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1315,30 +1775,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Indicates a concept can potentially be a 'risk source' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Potential RiskSource" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/owl#Incident" + "@id": "https://w3id.org/dpv/owl#Risk" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://purl.org/dc/terms/created": [ @@ -1347,11 +1813,6 @@ "@value": "2024-02-14" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1366,120 +1827,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" + "@value": "has risk source" } ], "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } - ], - "https://schema.org/rangeIncludes": [ { "@id": "https://w3id.org/dpv/owl#Risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Incident", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0070" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "An actual or occured event" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident" - } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ] } diff --git a/2.1-dev/risk/modules/core-owl.n3 b/2.1-dev/risk/modules/core-owl.n3 index 8615317e8..e41c3ff6a 100644 --- a/2.1-dev/risk/modules/core-owl.n3 +++ b/2.1-dev/risk/modules/core-owl.n3 @@ -16,6 +16,28 @@ @prefix vann: . @prefix xsd: . +risk-owl:AvailabilityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Availability' in CIA InfoSec model"@en ; + skos:prefLabel "Availability Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + +risk-owl:ConfidentialityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model"@en ; + skos:prefLabel "Confidentiality Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -30,6 +52,61 @@ risk-owl:Incident a rdfs:Class, skos:prefLabel "Incident"@en ; skos:scopeNote "Incident is realised or materialised risk"@en . +risk-owl:IntegrityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model"@en ; + skos:prefLabel "Integrity Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + +risk-owl:PotentialConsequence a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'consequence concept within an use-case"@en ; + skos:prefLabel "Potential Consequence"@en ; + skos:scopeNote "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialImpact a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'impact' concept within an use-case"@en ; + skos:prefLabel "Potential Impact"@en ; + skos:scopeNote "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialRisk a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'risk' concept within an use-case"@en ; + skos:prefLabel "Potential Risk"@en ; + skos:scopeNote "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialRiskSource a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'risk source' concept within an use-case"@en ; + skos:prefLabel "Potential RiskSource"@en ; + skos:scopeNote "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + risk-owl:RiskAnalysis a rdfs:Class, owl:Class ; dct:contributor "Harshvardhan J. Pandit" ; diff --git a/2.1-dev/risk/modules/core-owl.rdf b/2.1-dev/risk/modules/core-owl.rdf index 8adc85b83..24e45ab44 100644 --- a/2.1-dev/risk/modules/core-owl.rdf +++ b/2.1-dev/risk/modules/core-owl.rdf @@ -13,363 +13,447 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - Vulnerability - 2024-02-14 + + Harshvardhan J. Pandit accepted - + 2024-09-29 + PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + + + Potential Impact + Indicates a concept can potentially be a 'impact' concept within an use-case - + + Indicates the use of specified control - Indicates the cause of associated context (subject) was the indicated threat (object) - - - caused by threat - 2024-02-14 + + has control accepted + 2024-02-14 + + - + + Indicates a concept is relevant to 'Integrity' in CIA InfoSec model + Integrity Concept + This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - + Harshvardhan J. Pandit accepted + - 2024-08-16 - 2024-02-14 - Risk Source - - - - 2.1-dev - - - - - - - - - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - - Rob Brennan - Delaram Golpayegani - Harshvardhan J. Pandit - Julio Fernandez - 10.5281/zenodo.12505841 - Beatriz Esteves - Georg P. Krog - Paul Ryan - Harshvardhan J. Pandit - Julian Flake - Delaram Golpayegani - Rob Brennan - risk - - https://w3id.org/dpv/risk# - - - - Risk Concepts - - 2022-08-14 - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2024-08-18 - - - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2.1-dev - RISK - - http://purl.org/ontology/bibo/status/published - https://w3id.org/dpv/risk - 2022-08-14 + 2024-09-29 - - 2024-02-14 + - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) - - - - + 2024-02-14 accepted - + + + + has incident + Indicates an incident is associated with the specified context - + + accepted - + is exploited by 2024-02-14 - - - is exploited by + + Indicates the vulnerability (subject) is exploited by the indicated threat (object) - accepted + - - - Indicates the incident (subject) is a materialisation of the indicated risk (object) - refers to risk + 2024-02-14 - - - - - - - accepted - - + + exploits vulnerability + + - - + + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + Risk source event which causes Risk 2024-02-14 - has threat source - - - Indicates the threat (subject) has the indicated source (object) + + + + accepted + + Threat + + + Risk Concepts - JSON-LD serialiation + + + + + + + accepted + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + + Risk Source + + + 2024-08-16 + 2024-02-14 - + + + + caused by vulnerability accepted + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + 2024-02-14 - Threat + + + - Risk source event which causes Risk - + Risk Matrix + Harshvardhan J. Pandit + 2024-02-14 + accepted + + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + - + + Guides for Data Privacy Vocabulary + + + + + + + + + Risk Concepts - N3 serialiation + + + + ISO 31073:2022 Risk management vocabulary + 2024-06-12 + + + accepted + + + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + Risk Management + + + + + + 2024-02-14 + accepted + Indicates the vulnerability (subject) is associated with indicated context (object) + is vulnerability of + + + + + + + + + accepted + + + + refers to risk + 2024-02-14 + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + + http://www.w3.org/2004/02/skos/core + http://www.w3.org/2000/01/rdf-schema + + 2022-08-14 + https://w3id.org/dpv/risk# + + + + + + + + + RISK + + 2022-08-14 + Harshvardhan J. Pandit + Julian Flake + Delaram Golpayegani + Beatriz Esteves + Rob Brennan + Georg P. Krog + Paul Ryan + 2.1-dev + + + + + + + http://purl.org/ontology/bibo/status/published + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + 2.1-dev + + Risk Concepts + 10.5281/zenodo.12505841 + risk + 2024-08-18 + Harshvardhan J. Pandit + Julio Fernandez + Rob Brennan + Delaram Golpayegani + + https://w3id.org/dpv/risk + + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + - + + Primer for Data Privacy Vocabulary + + - - IEC 31010:2019 - https://www.iso.org/standard/72140.html - - - - Threat Source - accepted - - Source of threat event, including both agent and non-agent sources - 2024-02-14 + + + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - + Vulnerability + + 2024-02-14 + accepted - - - - + accepted - Indicates the use of specified control - - 2024-02-14 - has control + + + + 2024-09-29 + Availability Concept + This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact + Indicates a concept is relevant to 'Availability' in CIA InfoSec model - - - - - - Risk Concepts - N3 serialiation - - - + Harshvardhan J. Pandit - - Incident - An actual or occured event - - - + + Risk Assessment - - 2024-08-16 + ISO 31073:2022 Risk management vocabulary + Assessment of risk involving its identification, analysis, and evaluation + 2024-02-14 - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + accepted - Incident is realised or materialised risk - - 2022-08-18 - Risk Analysis + - Harshvardhan J. Pandit - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - accepted + Potential Consequence + PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - - + Harshvardhan J. Pandit + accepted + 2024-09-29 + + Indicates a concept can potentially be a 'consequence concept within an use-case - 2024-02-14 - Indicates the associated context (subject) has indicated vulnerability (object) + accepted has vulnerability - - - - accepted - - + 2024-02-14 - Indicates an incident is associated with the specified context - - accepted - - - has incident - 2024-02-14 - - - - - - - - Primer for Data Privacy Vocabulary + Indicates the associated context (subject) has indicated vulnerability (object) + - - Risk Matrix + - - + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + Risk Analysis + + + 2022-08-18 accepted - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - 2024-02-14 + Harshvardhan J. Pandit - - - - - - - - - Risk Concepts - Turtle serialiation - - accepted + + Incident is realised or materialised risk + + + 2024-02-14 - - Risk Assessment - 2024-02-14 - ISO 31073:2022 Risk management vocabulary + + Incident + 2024-08-16 + An actual or occured event + accepted + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - Assessment of risk involving its identification, analysis, and evaluation - has risk source - - + Indicates the risk (subject) has the indicated risk source (object) - accepted - Indicates the risk (subject) has the indicated risk source (object) - 2024-02-14 + has risk source + 2024-02-14 - - - - accepted + + + - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - caused by vulnerability + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) 2024-02-14 + accepted + + + - - - Risk Concepts - JSON-LD serialiation - - - - + + + Indicates a concept can potentially be a 'risk' concept within an use-case + 2024-09-29 + PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + Potential Risk + accepted + + Harshvardhan J. Pandit + + + Risk Concepts - RDF/XML serialiation - - - + + + + Risk Concepts - Turtle serialiation + + + + + + Threat Source + 2024-02-14 + + + accepted + Source of threat event, including both agent and non-agent sources + + + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + + + 2024-02-14 - is vulnerability of - - 2024-02-14 - Indicates the vulnerability (subject) is associated with indicated context (object) + + Indicates the threat (subject) has the indicated source (object) accepted + + + + has threat source - - Risk Management - 2024-06-12 - ISO 31073:2022 Risk management vocabulary + + https://www.iso.org/standard/72140.html + IEC 31010:2019 + + + + Confidentiality Concept - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk accepted - + Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + Harshvardhan J. Pandit + This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact + + 2024-09-29 - - - - - - - Examples for Data Privacy Vocabulary - - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html + + + + accepted + Potential RiskSource + + Harshvardhan J. Pandit + + 2024-09-29 + Indicates a concept can potentially be a 'risk source' concept within an use-case + PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - - + Risk Concepts - HTML serialiation + + + + + + Examples for Data Privacy Vocabulary + + + diff --git a/2.1-dev/risk/modules/core-owl.ttl b/2.1-dev/risk/modules/core-owl.ttl index 8615317e8..e41c3ff6a 100644 --- a/2.1-dev/risk/modules/core-owl.ttl +++ b/2.1-dev/risk/modules/core-owl.ttl @@ -16,6 +16,28 @@ @prefix vann: . @prefix xsd: . +risk-owl:AvailabilityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Availability' in CIA InfoSec model"@en ; + skos:prefLabel "Availability Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + +risk-owl:ConfidentialityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model"@en ; + skos:prefLabel "Confidentiality Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -30,6 +52,61 @@ risk-owl:Incident a rdfs:Class, skos:prefLabel "Incident"@en ; skos:scopeNote "Incident is realised or materialised risk"@en . +risk-owl:IntegrityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model"@en ; + skos:prefLabel "Integrity Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + +risk-owl:PotentialConsequence a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'consequence concept within an use-case"@en ; + skos:prefLabel "Potential Consequence"@en ; + skos:scopeNote "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialImpact a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'impact' concept within an use-case"@en ; + skos:prefLabel "Potential Impact"@en ; + skos:scopeNote "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialRisk a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'risk' concept within an use-case"@en ; + skos:prefLabel "Potential Risk"@en ; + skos:scopeNote "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialRiskSource a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'risk source' concept within an use-case"@en ; + skos:prefLabel "Potential RiskSource"@en ; + skos:scopeNote "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + risk-owl:RiskAnalysis a rdfs:Class, owl:Class ; dct:contributor "Harshvardhan J. Pandit" ; diff --git a/2.1-dev/risk/modules/core.csv b/2.1-dev/risk/modules/core.csv index e43120008..08b7cf09b 100644 --- a/2.1-dev/risk/modules/core.csv +++ b/2.1-dev/risk/modules/core.csv @@ -1,5 +1,12 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +AvailabilityConcept,class,https://w3id.org/dpv/risk#AvailabilityConcept,Availability Concept,Indicates a concept is relevant to 'Availability' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk +ConfidentialityConcept,class,https://w3id.org/dpv/risk#ConfidentialityConcept,Confidentiality Concept,Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,Incident is realised or materialised risk,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk +IntegrityConcept,class,https://w3id.org/dpv/risk#IntegrityConcept,Integrity Concept,Indicates a concept is relevant to 'Integrity' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk +PotentialConsequence,class,https://w3id.org/dpv/risk#PotentialConsequence,Potential Consequence,Indicates a concept can potentially be a 'consequence concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk +PotentialImpact,class,https://w3id.org/dpv/risk#PotentialImpact,Potential Impact,Indicates a concept can potentially be a 'impact' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk +PotentialRisk,class,https://w3id.org/dpv/risk#PotentialRisk,Potential Risk,Indicates a concept can potentially be a 'risk' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk +PotentialRiskSource,class,https://w3id.org/dpv/risk#PotentialRiskSource,Potential RiskSource,Indicates a concept can potentially be a 'risk source' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk RiskAnalysis,class,https://w3id.org/dpv/risk#RiskAnalysis,Risk Analysis,"A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures",,https://w3id.org/dpv/risk#RiskAssessment,https://w3id.org/dpv/risk#RiskAssessment,,2022-08-18,,risk,https://w3id.org/dpv/risk RiskAssessment,class,https://w3id.org/dpv/risk#RiskAssessment,Risk Assessment,"Assessment of risk involving its identification, analysis, and evaluation",,https://w3id.org/dpv/risk#RiskManagement,https://w3id.org/dpv/risk#RiskManagement,,2024-02-14,,risk,https://w3id.org/dpv/risk RiskManagement,class,https://w3id.org/dpv/risk#RiskManagement,Risk Management,"Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk",,,,,2024-06-12,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/core.jsonld b/2.1-dev/risk/modules/core.jsonld index c3fde09ca..216f3bf85 100644 --- a/2.1-dev/risk/modules/core.jsonld +++ b/2.1-dev/risk/modules/core.jsonld @@ -1,18 +1,266 @@ [ { - "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@id": "https://w3id.org/dpv/risk", + "@type": [ + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Delaram Golpayegani" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#refersToRisk", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://w3id.org/dpv#Incident" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@id": "https://w3id.org/dpv#Risk" } ], "http://purl.org/dc/terms/created": [ @@ -21,6 +269,11 @@ "@value": "2024-02-14" } ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -35,7 +288,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -46,66 +299,97 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" + "@value": "refers to risk" } ], "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://w3id.org/dpv#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@language": "en", + "@value": "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@language": "en", + "@value": "Integrity Concept" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -113,37 +397,48 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Indicates a concept is relevant to 'Availability' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" + "@value": "Availability Concept" } ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@language": "en", + "@value": "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#ThreatSource", + "@id": "https://w3id.org/dpv/risk#RiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -154,6 +449,12 @@ "@value": "2024-02-14" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -161,7 +462,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -170,10 +471,15 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -184,19 +490,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasIncident", + "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -219,7 +525,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -230,29 +536,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" + "@value": "is vulnerability of" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk#core-classes", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAssessment" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -261,6 +569,11 @@ "@value": "2024-02-14" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3a914addd1624a6ab69826c81a0b0778" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -272,44 +585,65 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" + "@value": "Risk Matrix" } + ] + }, + { + "@id": "_:N3a914addd1624a6ab69826c81a0b0778", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "IEC 31010:2019" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@id": "https://w3id.org/dpv/risk#RiskAnalysis", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -319,7 +653,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -328,10 +662,15 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -342,49 +681,74 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-classes", + "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk#Vulnerability", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#Threat", + "@id": "https://w3id.org/dpv/risk#RiskAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -395,6 +759,12 @@ "@value": "2024-02-14" } ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -402,7 +772,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -413,13 +783,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -430,24 +800,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@id": "https://w3id.org/dpv/risk#hasControl", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Incident" - } - ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://purl.org/dc/terms/created": [ @@ -458,7 +823,7 @@ ], "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -475,7 +840,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -483,39 +848,33 @@ "@id": "https://w3id.org/dpv/risk#core-properties" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "refers to risk" - } - ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv#Incident" + "@language": "en", + "@value": "has control" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAssessment", + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -525,7 +884,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -536,13 +895,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -553,30 +912,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Confidentiality Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#isExploitedBy", + "@id": "https://w3id.org/dpv/risk#PotentialRiskSource", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -584,91 +944,60 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@value": "Indicates a concept can potentially be a 'risk source' concept within an use-case" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "Risk Concepts - N3 serialiation" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@language": "en", + "@value": "Potential RiskSource" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-properties", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#Threat" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -691,7 +1020,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -702,36 +1031,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" + "@value": "exploits vulnerability" } ], "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk#Threat" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskManagement", + "@id": "https://w3id.org/dpv/risk#PotentialConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -741,7 +1069,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -750,10 +1078,15 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Indicates a concept can potentially be a 'consequence concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -764,209 +1097,237 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Potential Consequence" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#serialisation-html", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/format": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "Julio Fernandez" - }, + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "Harshvardhan J. Pandit" - }, + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#isExploitedBy", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Delaram Golpayegani" - }, + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Rob Brennan" + "@id": "https://w3id.org/dpv/risk#Threat" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Georg P. Krog" - }, + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Paul Ryan" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Rob Brennan" - }, + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Beatriz Esteves" - }, + "@value": "is exploited by" + } + ], + "https://schema.org/domainIncludes": [ { - "@language": "en", - "@value": "Julian Flake" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "http://purl.org/dc/terms/description": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "https://w3id.org/dpv/risk#Threat" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Incident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://w3id.org/dpv/risk" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/vocab/vann/example": [ { - "@language": "en", - "@value": "2024-08-18" + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0070" } ], - "http://purl.org/dc/terms/publisher": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "accepted" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@language": "en", + "@value": "An actual or occured event" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "risk" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Incident" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "RISK" + "@value": "Incident is realised or materialised risk" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "2.1-dev" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@language": "en", + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "caused by threat" } ], - "https://schema.org/version": [ + "https://schema.org/rangeIncludes": [ { - "@value": "2.1-dev" + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], @@ -982,12 +1343,12 @@ ], "http://purl.org/dc/terms/title": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -997,38 +1358,38 @@ ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "Risk Concepts - N3 serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk#PotentialRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -1041,12 +1402,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8c7d07a332384427aa20629b184e287b" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1056,7 +1412,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1067,13 +1423,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Indicates a concept can potentially be a 'risk' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1084,161 +1440,178 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" + "@value": "Potential Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "_:N8c7d07a332384427aa20629b184e287b", + "@id": "https://w3id.org/dpv/risk#hasIncident", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "IEC 31010:2019" + "@id": "https://w3id.org/dpv/risk#Incident" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates an incident is associated with the specified context" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk#core-properties", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAssessment" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/format": [ { - "@id": "_:N5faf38fbf04547d78ccaa2b8c1043b41" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Risk Matrix" + "@value": "Risk Concepts - Turtle serialiation" } - ] - }, - { - "@id": "_:N5faf38fbf04547d78ccaa2b8c1043b41", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "IEC 31010:2019" + "@id": "https://w3id.org/dpv/risk/risk.ttl" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#Incident", + "@id": "https://w3id.org/dpv/risk#Threat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples#E0070" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1246,7 +1619,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1257,13 +1630,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1274,39 +1647,33 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://www.w3.org/TR/json-ld11/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "Risk Concepts - JSON-LD serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/risk/risk.jsonld" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -1316,52 +1683,71 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/risk#causedByVulnerability", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Risk Concepts - HTML serialiation" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "caused by vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskSource", + "@id": "https://w3id.org/dpv/risk#PotentialImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1388,7 +1774,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Indicates a concept can potentially be a 'impact' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1399,19 +1785,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Potential Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@id": "https://w3id.org/dpv/risk#hasRiskSource", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" + } + ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://purl.org/dc/terms/created": [ @@ -1434,7 +1831,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1445,25 +1842,56 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" + "@value": "has risk source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ThreatSource", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -1476,6 +1904,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1485,46 +1918,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasControl", + "@id": "https://w3id.org/dpv/risk#RiskManagement", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-06-12" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1532,6 +1956,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1541,35 +1970,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByVulnerability", + "@id": "https://w3id.org/dpv/risk#hasThreatSource", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ], "http://purl.org/dc/terms/created": [ @@ -1592,7 +2021,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1603,12 +2032,17 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" + "@value": "has threat source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ] } diff --git a/2.1-dev/risk/modules/core.n3 b/2.1-dev/risk/modules/core.n3 index 866f5f6c8..0aacaaf9c 100644 --- a/2.1-dev/risk/modules/core.n3 +++ b/2.1-dev/risk/modules/core.n3 @@ -16,6 +16,32 @@ @prefix vann: . @prefix xsd: . +risk:AvailabilityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Availability' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Availability Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + +risk:ConfidentialityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Confidentiality Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -32,6 +58,71 @@ risk:Incident a rdfs:Class, skos:prefLabel "Incident"@en ; skos:scopeNote "Incident is realised or materialised risk"@en . +risk:IntegrityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Integrity Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + +risk:PotentialConsequence a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'consequence concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Consequence"@en ; + skos:scopeNote "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialImpact a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'impact' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Impact"@en ; + skos:scopeNote "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialRisk a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'risk' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Risk"@en ; + skos:scopeNote "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialRiskSource a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'risk source' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential RiskSource"@en ; + skos:scopeNote "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + risk:RiskAnalysis a rdfs:Class, skos:Concept ; dct:contributor "Harshvardhan J. Pandit" ; @@ -363,7 +454,7 @@ risk:serialisation-ttl a profile:ResourceDescriptor ; profile:hasArtifact ; profile:hasRole role:guidance . -risk:core-classes a skos:ConceptScheme . - risk:core-properties a skos:ConceptScheme . +risk:core-classes a skos:ConceptScheme . + diff --git a/2.1-dev/risk/modules/core.rdf b/2.1-dev/risk/modules/core.rdf index 13a316d65..3c556ea3b 100644 --- a/2.1-dev/risk/modules/core.rdf +++ b/2.1-dev/risk/modules/core.rdf @@ -13,6 +13,57 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > + + + + Availability Concept + Indicates a concept is relevant to 'Availability' in CIA InfoSec model + + + This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 + accepted + Harshvardhan J. Pandit + + + + + + + refers to risk + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + + 2024-02-14 + accepted + + + + + + + + Risk Analysis + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + + + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + + + Risk Concepts - HTML serialiation + @@ -41,10 +92,10 @@ Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - Julio Fernandez Harshvardhan J. Pandit - Delaram Golpayegani + Julio Fernandez Rob Brennan + Delaram Golpayegani risk https://w3id.org/dpv/risk# @@ -60,35 +111,47 @@ - + - Incident - An actual or occured event + Risk Source + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - Incident is realised or materialised risk 2024-02-14 2024-08-16 accepted - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - - + - has incident - Indicates an incident is associated with the specified context - - + exploits vulnerability + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + 2024-02-14 accepted + + + + + Risk Matrix + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + @@ -100,31 +163,75 @@ - + + + + Incident + An actual or occured event + + + Incident is realised or materialised risk + 2024-02-14 + 2024-08-16 + accepted + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + + + + + + + + + Guides for Data Privacy Vocabulary + + + + + + + + + + Risk Concepts - JSON-LD serialiation + + + + + + + + Risk Concepts - N3 serialiation + + - has control - Indicates the use of specified control - - + is vulnerability of + Indicates the vulnerability (subject) is associated with indicated context (object) + + 2024-02-14 accepted - - + - Threat - Risk source event which causes Risk - - + Risk Assessment + Assessment of risk involving its identification, analysis, and evaluation + + + ISO 31073:2022 Risk management vocabulary 2024-02-14 accepted + + + @@ -137,56 +244,67 @@ - - + + + + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + + + + 2024-02-14 + accepted + + + + - - Guides for Data Privacy Vocabulary + + + Primer for Data Privacy Vocabulary - + - Risk Source - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + Integrity Concept + Indicates a concept is relevant to 'Integrity' in CIA InfoSec model - 2024-02-14 - 2024-08-16 + This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 accepted + Harshvardhan J. Pandit - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html - - + - Threat Source - Source of threat event, including both agent and non-agent sources - + Threat + Risk source event which causes Risk + + 2024-02-14 accepted - - + - has threat source - Indicates the threat (subject) has the indicated source (object) - - - - - 2024-02-14 + + Potential RiskSource + Indicates a concept can potentially be a 'risk source' concept within an use-case + + + PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted + Harshvardhan J. Pandit - + @@ -202,66 +320,39 @@ - - - - - - - Risk Concepts - N3 serialiation - - - - - - - - Risk Concepts - RDF/XML serialiation - - + - - Risk Matrix - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - - 2024-02-14 + Potential Consequence + Indicates a concept can potentially be a 'consequence concept within an use-case + + + PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted Harshvardhan J. Pandit - - - - - Primer for Data Privacy Vocabulary - - - - - + - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - - - 2024-02-14 + + Confidentiality Concept + Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + + + This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 accepted - + Harshvardhan J. Pandit - + - + - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) - - + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) 2024-02-14 @@ -269,102 +360,90 @@ - + - Risk Management - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - ISO 31073:2022 Risk management vocabulary - 2024-06-12 + Potential Risk + Indicates a concept can potentially be a 'risk' concept within an use-case + + + PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted + Harshvardhan J. Pandit - - + - caused by vulnerability - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - + + Threat Source + Source of threat event, including both agent and non-agent sources + 2024-02-14 accepted - + - + - is vulnerability of - Indicates the vulnerability (subject) is associated with indicated context (object) - - + has vulnerability + Indicates the associated context (subject) has indicated vulnerability (object) + + 2024-02-14 accepted - + - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - - + has threat source + Indicates the threat (subject) has the indicated source (object) + + + + 2024-02-14 accepted - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + - - - - Risk Concepts - JSON-LD serialiation - - - - - Risk Analysis - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - - - - 2022-08-18 - accepted - Harshvardhan J. Pandit - - + + + + Risk Concepts - RDF/XML serialiation - + - Risk Assessment - Assessment of risk involving its identification, analysis, and evaluation - - + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + ISO 31073:2022 Risk management vocabulary - 2024-02-14 + 2024-06-12 accepted - - - - - - - Risk Concepts - HTML serialiation - - + + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + @@ -373,15 +452,16 @@ Risk Concepts - Turtle serialiation - + - has vulnerability - Indicates the associated context (subject) has indicated vulnerability (object) - - + has control + Indicates the use of specified control + + 2024-02-14 accepted + @@ -393,12 +473,30 @@ - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html + + + + has incident + Indicates an incident is associated with the specified context + + + 2024-02-14 + accepted + + - - + + + + Potential Impact + Indicates a concept can potentially be a 'impact' concept within an use-case + + + PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 + accepted + Harshvardhan J. Pandit + + diff --git a/2.1-dev/risk/modules/core.ttl b/2.1-dev/risk/modules/core.ttl index 866f5f6c8..0aacaaf9c 100644 --- a/2.1-dev/risk/modules/core.ttl +++ b/2.1-dev/risk/modules/core.ttl @@ -16,6 +16,32 @@ @prefix vann: . @prefix xsd: . +risk:AvailabilityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Availability' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Availability Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + +risk:ConfidentialityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Confidentiality Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -32,6 +58,71 @@ risk:Incident a rdfs:Class, skos:prefLabel "Incident"@en ; skos:scopeNote "Incident is realised or materialised risk"@en . +risk:IntegrityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Integrity Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + +risk:PotentialConsequence a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'consequence concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Consequence"@en ; + skos:scopeNote "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialImpact a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'impact' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Impact"@en ; + skos:scopeNote "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialRisk a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'risk' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Risk"@en ; + skos:scopeNote "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialRiskSource a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'risk source' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential RiskSource"@en ; + skos:scopeNote "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + risk:RiskAnalysis a rdfs:Class, skos:Concept ; dct:contributor "Harshvardhan J. Pandit" ; @@ -363,7 +454,7 @@ risk:serialisation-ttl a profile:ResourceDescriptor ; profile:hasArtifact ; profile:hasRole role:guidance . -risk:core-classes a skos:ConceptScheme . - risk:core-properties a skos:ConceptScheme . +risk:core-classes a skos:ConceptScheme . + diff --git a/2.1-dev/risk/modules/risk_consequences.csv b/2.1-dev/risk/modules/risk_consequences.csv deleted file mode 100644 index 8d54ca551..000000000 --- a/2.1-dev/risk/modules/risk_consequences.csv +++ /dev/null @@ -1,112 +0,0 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk -HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,risk,https://w3id.org/dpv/risk -Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk -JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk -LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk -NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#Impact;https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""LimitationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ViolationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk -SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,,,risk,https://w3id.org/dpv/risk -ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_consequences-owl.jsonld b/2.1-dev/risk/modules/risk_taxonomy-owl.jsonld similarity index 63% rename from 2.1-dev/risk/modules/risk_consequences-owl.jsonld rename to 2.1-dev/risk/modules/risk_taxonomy-owl.jsonld index eb1314cd5..7d78f6587 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.jsonld +++ b/2.1-dev/risk/modules/risk_taxonomy-owl.jsonld @@ -1,9 +1,87 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#NationalityDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's nationality or citizenship" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Nationality Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -25,7 +103,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" + "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -35,10 +113,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -50,37 +125,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", + "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -102,7 +181,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" + "@id": "_:Nb81ef67053e949d7a297791513c8eab8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -112,10 +191,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -127,37 +203,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", + "@id": "_:Nb81ef67053e949d7a297791513c8eab8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -167,7 +246,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -179,20 +258,22 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -215,266 +296,233 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - } + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ - { - "@value": "Julian Flake" - }, - { - "@value": "Fajar Ekaputra" - }, { "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Julian Flake" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@language": "en", + "@value": "Something that acts as or causes Unauthorised System Access" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "Unauthorised System Access" } + ] + }, + { + "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e", + "@type": [ + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/publisher": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Misogyny", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Risk Concepts" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "risk" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Dislike, contempt, or prejudice against women" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" + "@value": "Misogyny" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "2.1-dev" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2002/07/owl" - }, + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/owl" - }, + "@id": "_:N9d18ac853d6249008536496d60a088cd" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], - "https://schema.org/version": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@language": "en", + "@value": "Something that acts as or causes Equipment Failure" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@language": "en", + "@value": "Equipment Failure" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@language": "en", + "@value": "Here equipment refers to physical equipment" } + ] + }, + { + "@id": "_:N9d18ac853d6249008536496d60a088cd", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -496,7 +544,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2ea871931e3746e4aff469f67008e44f" + "@id": "_:N809a964650274e1ca9c544fb513732ef" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -506,7 +554,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -518,60 +566,80 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N2ea871931e3746e4aff469f67008e44f", + "@id": "_:N809a964650274e1ca9c544fb513732ef", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial penalties to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N0b5dd4cc254540f49140434e86708abb" + "@language": "en", + "@value": "Judicial Penalty" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightEroded", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -580,85 +648,98 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "The gradual weakening or reduction of the scope and protection of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" + "@value": "Erosion of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Delaram Golpayegani" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-06-11" } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Something that acts as or causes Misuse" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -681,7 +762,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" + "@id": "_:Neee39564ca4e493181200a260513b3de" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -691,7 +772,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -703,18 +784,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", + "@id": "_:Neee39564ca4e493181200a260513b3de", "@type": [ "https://schema.org/WebPage" ], @@ -730,10 +811,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -755,7 +840,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc4c391b305be479eb0e623d887a478ac" + "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -765,10 +850,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -780,66 +862,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" - } - ] - }, - { - "@id": "_:Nc4c391b305be479eb0e623d887a478ac", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "System Failure" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Individual Risk" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -851,7 +913,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -860,6 +922,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -867,7 +934,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -879,27 +946,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Unauthorised Data Access" } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + ] + }, + { + "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -921,7 +1001,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N64ebcf10636d495599fc0fd262e44103" + "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -931,10 +1011,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -946,37 +1023,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N64ebcf10636d495599fc0fd262e44103", + "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -998,7 +1078,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" + "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1008,36 +1088,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", + "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f", "@type": [ "https://schema.org/WebPage" ], @@ -1053,12 +1127,37 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1066,10 +1165,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1081,44 +1177,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DisabilityDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1128,7 +1226,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1140,21 +1238,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Discrimination against individuals based on physical or mental disabilities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Disability Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1176,7 +1279,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" + "@id": "_:N366da704654a4b4682d8de807d0f1bef" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1186,7 +1289,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1198,48 +1301,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", + "@id": "_:N366da704654a4b4682d8de807d0f1bef", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -1248,11 +1353,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N194bc10f01ef4bdb99f12487816e6826" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1260,7 +1360,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1272,37 +1372,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Detriment" } ] }, { - "@id": "_:N194bc10f01ef4bdb99f12487816e6826", + "@id": "https://w3id.org/dpv/risk/owl#Privacy", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1324,7 +1443,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" + "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1334,10 +1453,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1349,24 +1465,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" + "@value": "Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", + "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf", "@type": [ "https://schema.org/WebPage" ], @@ -1382,32 +1498,30 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#DataBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na783f8da28594e8794173492db9ecac9" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1417,7 +1531,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1429,37 +1543,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" - } - ] - }, - { - "@id": "_:Na783f8da28594e8794173492db9ecac9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Data Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1481,7 +1584,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0571680fc6554da2a384a2e851d510c0" + "@id": "_:Ne12951e4dd044f82839888833ef1ed00" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1491,10 +1594,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1506,18 +1606,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:N0571680fc6554da2a384a2e851d510c0", + "@id": "_:Ne12951e4dd044f82839888833ef1ed00", "@type": [ "https://schema.org/WebPage" ], @@ -1533,21 +1633,24 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1556,6 +1659,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1563,7 +1671,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1575,32 +1683,91 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect the reputation of the organisation" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reputational Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1611,7 +1778,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N53bfad5db8324151841ce01472d06f41" + "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1620,9 +1787,6 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } @@ -1636,24 +1800,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N53bfad5db8324151841ce01472d06f41", + "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d", "@type": [ "https://schema.org/WebPage" ], @@ -1669,10 +1833,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1694,7 +1861,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne3511d0b904a403e93b1538888ad1023" + "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1704,55 +1871,53 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Cryptojacking" } ] }, { - "@id": "_:Ne3511d0b904a403e93b1538888ad1023", + "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1774,7 +1939,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" + "@id": "_:N95204127ed924036926f89eb7e5b0678" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1784,66 +1949,108 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", + "@id": "_:N95204127ed924036926f89eb7e5b0678", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "https://w3id.org/dpv/risk/owl#RightsDenial", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The refusal or withholding or denial of the existence or applicability of rights" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Denial of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -1859,7 +2066,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1871,27 +2078,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1913,7 +2118,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfbea264abf694083a7d1db8b2101092b" + "@id": "_:N72f880006766453c8c5284ca9a8c23ae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1923,7 +2128,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1935,54 +2140,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:Nfbea264abf694083a7d1db8b2101092b", + "@id": "_:N72f880006766453c8c5284ca9a8c23ae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1991,6 +2193,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1998,7 +2205,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2010,44 +2217,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Lose of Customer Confidence" } + ] + }, + { + "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2057,7 +2277,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2069,51 +2289,70 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#ReverseDiscrimination", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - N3 serialiation" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reverse Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -2136,7 +2375,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" + "@id": "_:N05a9ed7355894f6bb37c02c33f9226da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2146,7 +2385,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2158,37 +2397,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", + "@id": "_:N05a9ed7355894f6bb37c02c33f9226da", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2210,7 +2454,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N33b7660d50a4461e927089957dfd848b" + "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2220,10 +2464,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2235,59 +2476,94 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Malware Attack" } ] }, { - "@id": "_:N33b7660d50a4461e927089957dfd848b", + "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with security threats that are likely to originate externally" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "External Security Threat" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7487c570f8f54358874e08fa38c8f27d" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2297,16 +2573,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2318,35 +2585,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N7487c570f8f54358874e08fa38c8f27d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Non-Response Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -2370,7 +2623,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" + "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2380,33 +2633,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", + "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf", "@type": [ "https://schema.org/WebPage" ], @@ -2422,32 +2678,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#DirectDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N90d89ca8a8594ecabee31205aee25395" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2457,7 +2700,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2469,48 +2712,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:N90d89ca8a8594ecabee31205aee25395", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Direct Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fee", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -2519,12 +2749,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "DGA 2.10" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2532,32 +2756,35 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -2580,7 +2807,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" + "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2590,16 +2817,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2611,18 +2829,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Sexual Violence" } ] }, { - "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", + "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3", "@type": [ "https://schema.org/WebPage" ], @@ -2638,10 +2856,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2663,7 +2884,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" + "@id": "_:N4f1e8d9a5f314a419875e658936b3a20" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2673,10 +2894,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2688,39 +2906,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", + "@id": "_:N4f1e8d9a5f314a419875e658936b3a20", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2728,7 +2966,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2737,40 +2975,72 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2780,16 +3050,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2801,38 +3062,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Confounding Variables Bias" } ] }, { - "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", + "@id": "https://w3id.org/dpv/risk/owl#ReligiousDiscrimination", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2841,16 +3095,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2862,23 +3107,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Discrimination based on a person's religious beliefs or practices" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Religious Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2886,7 +3151,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#Compensation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2898,38 +3163,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#Homophobia", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2939,7 +3196,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2951,39 +3208,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Homophobia" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://www.w3.org/TR/turtle/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "Risk Concepts - Turtle serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -2993,34 +3250,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#RightsUnfulfilled", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N89971235b5e34930a94f46c696e0ac94" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3028,10 +3266,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3043,37 +3278,33 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Failure to meet or complete the fulfilment of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ] - }, - { - "@id": "_:N89971235b5e34930a94f46c696e0ac94", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Unfulfilment of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3084,7 +3315,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3093,6 +3324,19 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3100,10 +3344,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3115,27 +3356,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Data Breach" + } + ] + }, + { + "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3157,7 +3410,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7b552ef83c274f84b167cc68c23676bb" + "@id": "_:N8626c0b412094a41834e4fa199b449f9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3167,10 +3420,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Impact" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3182,24 +3432,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N7b552ef83c274f84b167cc68c23676bb", + "@id": "_:N8626c0b412094a41834e4fa199b449f9", "@type": [ "https://schema.org/WebPage" ], @@ -3215,32 +3465,30 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#Bias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3250,10 +3498,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3265,59 +3510,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na882c52257364f5896e5b38b50bb08fe" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3327,7 +3554,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3339,36 +3566,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" - } - ] - }, - { - "@id": "_:Na882c52257364f5896e5b38b50bb08fe", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Societal Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -3391,7 +3605,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" + "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3401,16 +3615,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3422,18 +3627,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Terrorism" } ] }, { - "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", + "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880", "@type": [ "https://schema.org/WebPage" ], @@ -3449,32 +3654,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#RacialDiscrimination", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N18aeaa08367a4c56822793249e34feae" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3484,10 +3676,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#Racism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3499,43 +3688,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Discrimination against individuals because of their racial background or skin color" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Racial Discrimination" } ] }, { - "@id": "_:N18aeaa08367a4c56822793249e34feae", + "@id": "https://w3id.org/dpv/risk/owl#GeographicDiscrimination", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's geographical origin or residence" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Geographic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3557,7 +3772,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" + "@id": "_:N91553afacd2e4fc881b533ca4457b82b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3567,13 +3782,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3585,37 +3794,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Physical Assault" } ] }, { - "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", + "@id": "_:N91553afacd2e4fc881b533ca4457b82b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3637,7 +3850,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb240be91051241df8fe71581eedea8cc" + "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3647,36 +3860,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:Nb240be91051241df8fe71581eedea8cc", + "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f", "@type": [ "https://schema.org/WebPage" ], @@ -3692,10 +3899,69 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Group Attribution Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3706,7 +3972,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -3722,7 +3988,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3734,20 +4000,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -3770,7 +4045,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N698d6b9272804e2dba685b14f6e69152" + "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3780,7 +4055,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3792,37 +4067,2257 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Human Errors" } ] }, { - "@id": "_:N698d6b9272804e2dba685b14f6e69152", + "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584", "@type": [ "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AgeDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's age, often impacting older or younger individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Age Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Discrimination" + }, + { + "@language": "en", + "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4cecb70bedcf46ce9f21038688293a9e" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Fraud" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Fraud" + } + ] + }, + { + "@id": "_:N4cecb70bedcf46ce9f21038688293a9e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with risks that arise due to User or Human use" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "User Risks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Out-Group Homogeneity Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Misuse" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Intentional Misuse" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Intentional Misuse" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Simpson'S Paradox Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6ec056b8005a44a48b4e0542b09105e6" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "_:N6ec056b8005a44a48b4e0542b09105e6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + } + ] + }, + { + "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Racism", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Prejudice or discrimination against people based on their race" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Racism" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Processing Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised System Modification" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised System Modification" + } + ] + }, + { + "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "modified" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Violation of Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Harm" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reward" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Public Order Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Public Order Breach" + } + ] + }, + { + "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CasteDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Caste Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EthnicDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Racism" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Ethnic Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Bias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when humans are processing and interpreting information" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Cognitive Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N24492f14343b4b90bddc2673a3b6d932" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Resource Use" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Resource Use" + } + ] + }, + { + "@id": "_:N24492f14343b4b90bddc2673a3b6d932", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndirectDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Indirect Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Activity" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Activity" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "SexualOrientation Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unwanted Disclosure of Data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unwanted Disclosure of Data" + } + ] + }, + { + "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Harm to humans" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8a73cba67e0045688727d0972f8b70f6" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Account Credentials to be compromised" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Compromise Account Credentials" + } + ] + }, + { + "@id": "_:N8a73cba67e0045688727d0972f8b70f6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6eb433c5024843b085be0656a9fc2cbb" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Spoofing" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Spoofing" + } + ] + }, + { + "@id": "_:N6eb433c5024843b085be0656a9fc2cbb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Security Attack" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs in or during requirements creation" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Requirements Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Misandry", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Sexism" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Dislike, contempt, or prejudice against men" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Misandry" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#", + "@type": [ + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Beatriz Esteves" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/hasVersion": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "https://schema.org/url": [ + "https://schema.org/version": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3844,7 +6339,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" + "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3854,10 +6349,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3869,18 +6361,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", + "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd", "@type": [ "https://schema.org/WebPage" ], @@ -3896,72 +6388,70 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@language": "en", + "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Malicious Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Societal Health & Safety" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3970,7 +6460,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3982,23 +6472,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4006,7 +6523,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4018,20 +6535,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4054,7 +6581,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" + "@id": "_:N4a6ecf056dcd484394a81241d36bbc29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4064,16 +6591,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4085,157 +6603,134 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Identity Theft" } ] }, { - "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", + "@id": "_:N4a6ecf056dcd484394a81241d36bbc29", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Financial Impact" + "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4" } - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "Something that acts as or causes Injury" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/primer" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N72e00e4999f548eb88bf909311860524" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4245,10 +6740,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4260,48 +6752,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" - } - ] - }, - { - "@id": "_:N72e00e4999f548eb88bf909311860524", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -4317,7 +6796,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4329,21 +6808,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4365,7 +6847,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8705162a41ca472c9e3867ec5902de25" + "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4375,10 +6857,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4390,18 +6869,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N8705162a41ca472c9e3867ec5902de25", + "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908", "@type": [ "https://schema.org/WebPage" ], @@ -4417,56 +6896,31 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Component Failure" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "ISO/IEC 24027:2021" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4475,7 +6929,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4487,21 +6941,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4523,7 +6987,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" + "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4533,10 +6997,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4548,43 +7009,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", + "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk/owl#RightObstructed", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4594,60 +7052,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that arise during operational processes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Operational Security Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4659,27 +7064,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Interference with or blocking of the exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Obstruction of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4701,10 +7109,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" - }, - { - "@id": "_:N539160303302464aa341bdfa53068f22" + "@id": "_:N6177ab61947545c3b0f993f924c70c28" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4714,16 +7119,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4735,53 +7131,45 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Violence against children" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N539160303302464aa341bdfa53068f22", + "@id": "_:N6177ab61947545c3b0f993f924c70c28", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4814,10 +7202,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4839,7 +7232,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" + "@id": "_:Nd6abb4f630e44551bf502809758f49c1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4849,10 +7242,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4864,36 +7254,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Sabotage" } ] }, { - "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", + "@id": "_:Nd6abb4f630e44551bf502809758f49c1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -4904,7 +7297,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4913,18 +7306,86 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Remuneration" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4946,7 +7407,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3adf839933da482c89a2828fc9743969" + "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4956,10 +7417,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4971,39 +7429,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:N3adf839933da482c89a2828fc9743969", + "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk/owl#Sexism", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5011,7 +7478,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5023,117 +7490,103 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Sexism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ { - "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Guides for Data Privacy Vocabulary" } - ] - }, - { - "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/guides" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0ddf524630684b719d7f03f907c20cff" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5143,7 +7596,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5155,37 +7608,70 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Coverage Bias" } ] }, { - "@id": "_:N0ddf524630684b719d7f03f907c20cff", + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5195,10 +7681,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5206,12 +7689,22 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Health & Safety" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5234,7 +7727,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" + "@id": "_:Nb72c07b7fa024bcf85183796d36738b4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5244,10 +7737,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5259,59 +7749,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Blackmail" } ] }, { - "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", + "@id": "_:Nb72c07b7fa024bcf85183796d36738b4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N50def33314ee4442bf7e77161e51165b" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5321,7 +7809,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5333,43 +7821,121 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" + "@value": "Selection Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Environmental Risk" } ] }, { - "@id": "_:N50def33314ee4442bf7e77161e51165b", + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Georg P. Krog" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Social Disadvantage" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5391,7 +7957,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" + "@id": "_:N174281b4f06940a18a9e6519d98fa3e3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5401,13 +7967,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5419,36 +7979,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "System Intrusion" } ] }, { - "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", + "@id": "_:N174281b4f06940a18a9e6519d98fa3e3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -5471,7 +8037,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3984b17b1694455793b94c3ad850178d" + "@id": "_:Nedb073eb260845019e04df25c90d654e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5481,7 +8047,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5493,37 +8059,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Security Breach" } ] }, { - "@id": "_:N3984b17b1694455793b94c3ad850178d", + "@id": "_:Nedb073eb260845019e04df25c90d654e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5545,7 +8114,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" + "@id": "_:N625f03306b04496198a17a1c1fc9f2cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5555,10 +8124,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5570,18 +8136,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Financial Loss" } ] }, { - "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", + "@id": "_:N625f03306b04496198a17a1c1fc9f2cc", "@type": [ "https://schema.org/WebPage" ], @@ -5597,10 +8163,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5622,7 +8192,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N029a97b214024c18a899586cb3864d2a" + "@id": "_:Nd268380dc1f84dea9ec58ef31331c264" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5632,10 +8202,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5647,37 +8214,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Scam" } ] }, { - "@id": "_:N029a97b214024c18a899586cb3864d2a", + "@id": "_:Nd268380dc1f84dea9ec58ef31331c264", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5699,7 +8269,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" + "@id": "_:Ndd18bed776ec45498b139828923f57f1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5709,7 +8279,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5721,18 +8291,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", + "@id": "_:Ndd18bed776ec45498b139828923f57f1", "@type": [ "https://schema.org/WebPage" ], @@ -5748,34 +8318,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5783,7 +8334,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#Misuse" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5795,37 +8346,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5847,7 +8384,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" + "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5857,30 +8394,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", + "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda", "@type": [ "https://schema.org/WebPage" ], @@ -5896,10 +8439,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5921,7 +8468,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" + "@id": "_:Nadd5922c22574bd38879939155a85ae3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5931,13 +8478,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5949,59 +8490,85 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Identity Fraud" } ] }, { - "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", + "@id": "_:Nadd5922c22574bd38879939155a85ae3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1005943ded74408ea68c811475686000" + "@language": "en", + "@value": "ISO 20501:2019" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6011,10 +8578,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6026,48 +8590,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" - } - ] - }, - { - "@id": "_:N1005943ded74408ea68c811475686000", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Statistical Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -6076,6 +8627,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6083,10 +8639,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6098,20 +8651,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -6134,7 +8707,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N258e312c37aa4354bed73603ef7a36f6" + "@id": "_:N636eafbaa808469aa226aaa74ca74855" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6144,30 +8717,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N258e312c37aa4354bed73603ef7a36f6", + "@id": "_:N636eafbaa808469aa226aaa74ca74855", "@type": [ "https://schema.org/WebPage" ], @@ -6183,9 +8762,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -6208,7 +8791,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" + "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6218,10 +8801,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6230,46 +8810,42 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes System Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "System Failure" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", + "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6279,16 +8855,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6300,38 +8867,72 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6341,7 +8942,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6353,45 +8954,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Sampling Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N95f46ba999c74717949420ed05a75570" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6399,7 +8982,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6411,65 +8994,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" + "@value": "Component Failure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N95f46ba999c74717949420ed05a75570", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6479,16 +9044,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6500,60 +9056,70 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Non-Normality Bias" } ] }, { - "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", + "@id": "https://w3id.org/dpv/risk/owl#GenderDiscrimination", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk/owl#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "Discrimination based on a person's gender identity or gender expression" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" + "@language": "en", + "@value": "Gender Discrimination" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SexualHarassment", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6562,13 +9128,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6577,40 +9137,53 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Sexual Harassment" } ] }, { - "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6632,7 +9205,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb75b090fdcda4ec38e841680681bf642" + "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6642,13 +9215,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6660,54 +9227,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:Nb75b090fdcda4ec38e841680681bf642", + "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#ExcellenceDiscrimination", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6717,7 +9282,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6729,38 +9294,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Excellence Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6770,7 +9338,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6782,27 +9350,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "Implicit Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6824,7 +9389,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc74530c53d534886a66e5a7f741398bb" + "@id": "_:N60882207c25442eab9509dc96896d91a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6834,10 +9399,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6849,48 +9411,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:Nc74530c53d534886a66e5a7f741398bb", + "@id": "_:N60882207c25442eab9509dc96896d91a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -6906,7 +9472,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6918,43 +9484,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6964,10 +9528,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6979,37 +9540,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" - } - ] - }, - { - "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Informativeness Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7031,15 +9581,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@id": "_:Nc32ca360a68540de9b7d635beec8d66a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7049,16 +9591,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7070,37 +9603,86 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", + "@id": "_:Nc32ca360a68540de9b7d635beec8d66a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#Transphobia", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Sexism" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Transphobia" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7122,7 +9704,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0eacc049940646a99623da2cd6a2d394" + "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7132,10 +9714,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7147,36 +9726,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N0eacc049940646a99623da2cd6a2d394", + "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -7199,7 +9780,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nde382e9a51c445d69476b298827b1cbe" + "@id": "_:N01592d7a5ed64907a324ef43ea425e66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7209,36 +9790,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:Nde382e9a51c445d69476b298827b1cbe", + "@id": "_:N01592d7a5ed64907a324ef43ea425e66", "@type": [ "https://schema.org/WebPage" ], @@ -7254,57 +9835,55 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Intentional Misuse" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Intentional Misuse" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -7320,7 +9899,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7332,82 +9911,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "A limitation or restrictions on the scope or exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Limitation of Rights" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "https://w3id.org/dpv/risk/owl#Harassment", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7415,7 +9944,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7424,24 +9953,21 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Detriment" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7463,7 +9989,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" + "@id": "_:N58c7a823728a4bbc929c09b50030b836" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7485,18 +10011,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Lose of Trust" } ] }, { - "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", + "@id": "_:N58c7a823728a4bbc929c09b50030b836", "@type": [ "https://schema.org/WebPage" ], @@ -7512,40 +10038,58 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "https://w3id.org/dpv/risk/owl#LanguageDiscrimination", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - HTML serialiation" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Language Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -7568,7 +10112,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" + "@id": "_:N45e627abb33f484ea319253eb043bcd9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7578,13 +10122,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7596,65 +10134,66 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Extorsion" } ] }, { - "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", + "@id": "_:N45e627abb33f484ea319253eb043bcd9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "accepted" + "@id": "_:N01f7495831e241abad48b454e2462d19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7663,7 +10202,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7672,20 +10211,68 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "Compromise Account" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "_:N01f7495831e241abad48b454e2462d19", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7693,55 +10280,64 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", + "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SexDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7751,7 +10347,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7763,37 +10359,58 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Discrimination based on a person's biological sex" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Sex Discrimination" } ] }, { - "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7815,7 +10432,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1f36b972c50f49fb9b474152b57cf474" + "@id": "_:N70af67194f054cbcbe4d1d616683423b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7825,50 +10442,41 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "Coercion" } ] }, { - "@id": "_:N1f36b972c50f49fb9b474152b57cf474", + "@id": "_:N70af67194f054cbcbe4d1d616683423b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] } diff --git a/2.1-dev/risk/modules/risk_consequences-owl.n3 b/2.1-dev/risk/modules/risk_taxonomy-owl.n3 similarity index 54% rename from 2.1-dev/risk/modules/risk_consequences-owl.n3 rename to 2.1-dev/risk/modules/risk_taxonomy-owl.n3 index 1fdb2d194..1dc03ef44 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.n3 +++ b/2.1-dev/risk/modules/risk_taxonomy-owl.n3 @@ -17,16 +17,36 @@ risk-owl:AccidentalMisuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:UserRisks ; + rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; skos:definition "Accidental Misuse"@en ; skos:prefLabel "Accidental Misuse"@en . +risk-owl:AgeDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's age, often impacting older or younger individuals"@en ; + skos:prefLabel "Age Discrimination"@en . + risk-owl:AuthorisationFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -34,36 +54,59 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:Benefit a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Compensation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . +risk-owl:Bias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:prefLabel "Bias"@en . + risk-owl:Blackmail a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -71,15 +114,18 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -87,16 +133,31 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . +risk-owl:CasteDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's caste, a form of social stratification found in some cultures"@en ; + skos:prefLabel "Caste Discrimination"@en . + risk-owl:Coercion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -104,30 +165,50 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . +risk-owl:CognitiveBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:prefLabel "Cognitive Bias"@en . + risk-owl:Compensation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:prefLabel "Compensation"@en . risk-owl:ComponentFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -135,10 +216,13 @@ risk-owl:ComponentFailure a rdfs:Class, risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -146,7 +230,13 @@ risk-owl:ComponentMalfunction a rdfs:Class, risk-owl:CompromiseAccount a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -154,17 +244,18 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . risk-owl:CompromiseAccountCredentials a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -172,15 +263,18 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -188,15 +282,46 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . +risk-owl:ConfirmationBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:prefLabel "Confirmation Bias"@en . + +risk-owl:ConfoundingVariablesBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:prefLabel "Confounding Variables Bias"@en . + risk-owl:CopyrightViolation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -204,14 +329,32 @@ risk-owl:CopyrightViolation a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . +risk-owl:CoverageBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:prefLabel "Coverage Bias"@en . + risk-owl:Cryptojacking a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -219,15 +362,17 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . risk-owl:Damage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -237,9 +382,45 @@ risk-owl:Damage a rdfs:Class, skos:definition "Something that acts as or causes Damage"@en ; skos:prefLabel "Damage"@en . +risk-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + risk-owl:DataBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -249,17 +430,18 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . risk-owl:DataCorruption a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -267,16 +449,33 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . +risk-owl:DataProcessingBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:prefLabel "Data Processing Bias"@en . + risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -284,15 +483,16 @@ risk-owl:DenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:Detriment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -302,21 +502,57 @@ risk-owl:Detriment a rdfs:Class, skos:definition "Something that acts as or causes Detriment"@en ; skos:prefLabel "Detriment"@en . +risk-owl:DirectDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)"@en ; + skos:prefLabel "Direct Discrimination"@en . + +risk-owl:DisabilityDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals based on physical or mental disabilities"@en ; + skos:prefLabel "Disability Discrimination"@en . + risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dct:created "2022-08-19"^^xsd:date, + "2024-09-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RiskConcept, + risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Discrimination"@en ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, + "Something that acts as or causes Discrimination"@en ; skos:prefLabel "Discrimination"@en . risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -324,15 +560,17 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:DenialServiceAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . risk-owl:EnvironmentalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -341,7 +579,11 @@ risk-owl:EnvironmentalRisk a rdfs:Class, risk-owl:EquipmentFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -349,8 +591,7 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -358,7 +599,11 @@ risk-owl:EquipmentFailure a rdfs:Class, risk-owl:EquipmentMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -366,8 +611,7 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -375,7 +619,10 @@ risk-owl:EquipmentMalfunction a rdfs:Class, risk-owl:ErroneousSystemUse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -388,9 +635,38 @@ risk-owl:ErroneousSystemUse a rdfs:Class, skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:prefLabel "Erroneous System Use"@en . +risk-owl:EthnicDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Racism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals based on their ethnicity or cultural heritage"@en ; + skos:prefLabel "Ethnic Discrimination"@en . + +risk-owl:ExcellenceDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Favoritism towards individuals deemed more competent or superior, often at the expense of others"@en ; + skos:prefLabel "Excellence Discrimination"@en . + risk-owl:ExposureToHarmfulSpeech a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -406,7 +682,8 @@ risk-owl:ExposureToHarmfulSpeech a rdfs:Class, risk-owl:ExternalSecurityThreat a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -415,7 +692,11 @@ risk-owl:ExternalSecurityThreat a rdfs:Class, risk-owl:Extorsion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -423,28 +704,17 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . -risk-owl:Fee a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source "DGA 2.10"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; - sw:term_status "modified"@en ; - skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; - skos:prefLabel "Fee"@en . - risk-owl:FinancialImpact a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -453,7 +723,10 @@ risk-owl:FinancialImpact a rdfs:Class, risk-owl:FinancialLoss a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -468,7 +741,11 @@ risk-owl:FinancialLoss a rdfs:Class, risk-owl:Fraud a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -476,15 +753,69 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . +risk-owl:GenderDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's gender identity or gender expression"@en ; + skos:prefLabel "Gender Discrimination"@en . + +risk-owl:GeographicDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's geographical origin or residence"@en ; + skos:prefLabel "Geographic Discrimination"@en . + +risk-owl:GroupAttributionBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:prefLabel "Group Attribution Bias"@en . + +risk-owl:Harassment a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Harm ; + sw:term_status "accepted"@en ; + skos:prefLabel "Harassment"@en . + risk-owl:Harm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -495,9 +826,25 @@ risk-owl:Harm a rdfs:Class, skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . +risk-owl:Homophobia a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SexualOrientationDiscrimination ; + sw:term_status "accepted"@en ; + skos:definition "Hostility or prejudice against individuals who are or are perceived to be homosexual"@en ; + skos:prefLabel "Homophobia"@en . + risk-owl:HumanErrors a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -512,7 +859,11 @@ risk-owl:HumanErrors a rdfs:Class, risk-owl:IdentityFraud a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -520,15 +871,18 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -536,15 +890,16 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -558,24 +913,91 @@ risk-owl:IllegalDataProcessing a rdfs:Class, skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . +risk-owl:ImplicitBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:prefLabel "Implicit Bias"@en . + +risk-owl:InGroupBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:prefLabel "In-Group Bias"@en . + +risk-owl:IndirectDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified"@en ; + skos:prefLabel "Indirect Discrimination"@en . + risk-owl:IndividualHealthSafety a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; skos:prefLabel "Individual Health & Safety"@en . risk-owl:IndividualRisk a rdfs:Class, - owl:Class ; + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:prefLabel "Individual Risk"@en . +risk-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:prefLabel "Informativeness Bias"@en . + risk-owl:Injury a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -583,31 +1005,41 @@ risk-owl:Injury a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Injury"@en ; skos:prefLabel "Injury"@en . risk-owl:IntegrityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:IntentionalMisuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:UserRisks ; + rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; skos:definition "Intentional Misuse"@en ; skos:prefLabel "Intentional Misuse"@en . risk-owl:InterceptCommunications a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -615,8 +1047,7 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; @@ -624,25 +1055,46 @@ risk-owl:InterceptCommunications a rdfs:Class, risk-owl:JudicialCosts a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:FinancialLoss ; sw:term_status "accepted"@en ; skos:definition "Something that involves or causes judicial costs to be paid"@en ; skos:prefLabel "Judicial Costs"@en . risk-owl:JudicialPenalty a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:FinancialLoss ; sw:term_status "accepted"@en ; skos:definition "Something that involves or causes judicial penalties to be paid"@en ; skos:prefLabel "Judicial Penalty"@en . +risk-owl:LanguageDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; + skos:prefLabel "Language Discrimination"@en . + risk-owl:LegalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -651,7 +1103,10 @@ risk-owl:LegalRisk a rdfs:Class, risk-owl:LoseCredibility a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -666,7 +1121,10 @@ risk-owl:LoseCredibility a rdfs:Class, risk-owl:LoseCustomerConfidence a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -681,7 +1139,10 @@ risk-owl:LoseCustomerConfidence a rdfs:Class, risk-owl:LoseGoodwill a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -696,7 +1157,10 @@ risk-owl:LoseGoodwill a rdfs:Class, risk-owl:LoseNegotiatingCapacity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -711,7 +1175,10 @@ risk-owl:LoseNegotiatingCapacity a rdfs:Class, risk-owl:LoseOpportunity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -726,7 +1193,10 @@ risk-owl:LoseOpportunity a rdfs:Class, risk-owl:LoseReputation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -741,7 +1211,10 @@ risk-owl:LoseReputation a rdfs:Class, risk-owl:LoseTrust a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -754,9 +1227,26 @@ risk-owl:LoseTrust a rdfs:Class, skos:definition "Something that acts as or causes Loss of Trust"@en ; skos:prefLabel "Lose of Trust"@en . +risk-owl:MaliciousActivity a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "accepted"@en ; + skos:definition "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others"@en ; + skos:prefLabel "Malicious Activity"@en . + risk-owl:MaliciousCodeAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -764,17 +1254,19 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -782,17 +1274,17 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -803,9 +1295,38 @@ risk-owl:MaterialDamage a rdfs:Class, skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk-owl:Misandry a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Dislike, contempt, or prejudice against men"@en ; + skos:prefLabel "Misandry"@en . + +risk-owl:Misogyny a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Dislike, contempt, or prejudice against women"@en ; + skos:prefLabel "Misogyny"@en . + risk-owl:Misuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -815,9 +1336,25 @@ risk-owl:Misuse a rdfs:Class, skos:definition "Something that acts as or causes Misuse"@en ; skos:prefLabel "Misuse"@en . +risk-owl:NationalityDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's nationality or citizenship"@en ; + skos:prefLabel "Nationality Discrimination"@en . + risk-owl:NonMaterialDamage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -828,30 +1365,83 @@ risk-owl:NonMaterialDamage a rdfs:Class, skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk-owl:NonNormalityBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:prefLabel "Non-Normality Bias"@en . + +risk-owl:NonResponseBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:prefLabel "Non-Response Bias"@en . + risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:prefLabel "Operational Security Risk"@en . +risk-owl:OutGroupHomogeneityBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + risk-owl:Payment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:prefLabel "Payment"@en . risk-owl:PersonalSafetyEndangerment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -866,7 +1456,11 @@ risk-owl:PersonalSafetyEndangerment a rdfs:Class, risk-owl:PhishingScam a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -874,15 +1468,17 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -890,22 +1486,28 @@ risk-owl:PhysicalAssault a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . risk-owl:PhysicalHarm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:prefLabel "Physical Harm"@en . risk-owl:Privacy a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; @@ -913,7 +1515,10 @@ risk-owl:Privacy a rdfs:Class, risk-owl:PsychologicalHarm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -921,14 +1526,16 @@ risk-owl:PsychologicalHarm a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -941,23 +1548,68 @@ risk-owl:PublicOrderBreach a rdfs:Class, skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . +risk-owl:RacialDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Racism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals because of their racial background or skin color"@en ; + skos:prefLabel "Racial Discrimination"@en . + +risk-owl:Racism a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Prejudice or discrimination against people based on their race"@en ; + skos:prefLabel "Racism"@en . + risk-owl:Reidentification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . +risk-owl:ReligiousDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's religious beliefs or practices"@en ; + skos:prefLabel "Religious Discrimination"@en . + risk-owl:Renumeration a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -969,41 +1621,121 @@ risk-owl:Renumeration a rdfs:Class, risk-owl:ReputationalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:prefLabel "Reputational Risk"@en . +risk-owl:RequirementsBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + +risk-owl:ReverseDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality"@en ; + skos:prefLabel "Reverse Discrimination"@en . + risk-owl:Reward a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:prefLabel "Reward"@en . +risk-owl:RightEroded a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:prefLabel "Erosion of Rights"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightObstructed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:prefLabel "Obstruction of Rights"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightsDenial a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:prefLabel "Denial of Rights"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk-owl:RightsExercisePrevention a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; + skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; skos:prefLabel "Prevent Exercising of Rights"@en ; - skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsImpact a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1011,42 +1743,81 @@ risk-owl:RightsImpact a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Impact, - risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Impact to Rights"@en ; skos:prefLabel "Impact to Rights"@en ; - skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsLimitation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Limitation of Rights"@en ; + skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; skos:prefLabel "Limitation of Rights"@en ; - skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightsUnfulfilled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Failure to meet or complete the fulfilment of rights"@en ; + skos:prefLabel "Unfulfilment of Rights"@en ; + skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsViolation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; skos:prefLabel "Violation of Rights"@en ; - skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RuleBasedSystemDesign a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . risk-owl:Sabotage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1054,16 +1825,33 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . +risk-owl:SamplingBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:prefLabel "Sampling Bias"@en . + risk-owl:Scam a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1071,27 +1859,34 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . risk-owl:SecurityAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . risk-owl:SecurityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1099,17 +1894,82 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . +risk-owl:SelectionBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:prefLabel "Selection Bias"@en . + +risk-owl:SexDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's biological sex"@en ; + skos:prefLabel "Sex Discrimination"@en . + +risk-owl:Sexism a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping"@en ; + skos:prefLabel "Sexism"@en . + +risk-owl:SexualHarassment a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Harm ; + sw:term_status "accepted"@en ; + skos:prefLabel "Sexual Harassment"@en . + +risk-owl:SexualOrientationDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual"@en ; + skos:prefLabel "SexualOrientation Discrimination"@en . + risk-owl:SexualViolence a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1117,14 +1977,32 @@ risk-owl:SexualViolence a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . +risk-owl:SimpsonsParadoxBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1134,9 +2012,27 @@ risk-owl:SocialDisadvantage a rdfs:Class, skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . +risk-owl:SocietalBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:prefLabel "Societal Bias"@en . + risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; @@ -1144,7 +2040,10 @@ risk-owl:SocietalHealthSafety a rdfs:Class, risk-owl:SocietalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -1153,28 +2052,46 @@ risk-owl:SocietalRisk a rdfs:Class, risk-owl:Spoofing a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:prefLabel "Spoofing"@en . +risk-owl:StatisticalBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:prefLabel "Statistical Bias"@en . + risk-owl:SystemFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1182,8 +2099,7 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -1191,7 +2107,12 @@ risk-owl:SystemFailure a rdfs:Class, risk-owl:SystemIntrusion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1199,17 +2120,18 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1217,8 +2139,7 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -1226,7 +2147,10 @@ risk-owl:SystemMalfunction a rdfs:Class, risk-owl:Terrorism a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1239,9 +2163,28 @@ risk-owl:Terrorism a rdfs:Class, skos:definition "Something that acts as or causes Terrorism"@en ; skos:prefLabel "Terrorism"@en . +risk-owl:Transphobia a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms"@en ; + skos:prefLabel "Transphobia"@en . + risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1249,29 +2192,34 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1279,16 +2227,18 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1296,15 +2246,18 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1312,15 +2265,18 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1328,15 +2284,18 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1344,15 +2303,18 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1360,15 +2322,18 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1376,28 +2341,34 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1405,15 +2376,19 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1421,16 +2396,18 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1438,15 +2415,19 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . risk-owl:UnwantedCodeDeletion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1454,16 +2435,19 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1471,16 +2455,18 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1488,15 +2474,16 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk-owl:UserRisks a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -1505,7 +2492,9 @@ risk-owl:UserRisks a rdfs:Class, risk-owl:ViolatingCodeOfConduct a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1513,7 +2502,7 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; skos:prefLabel "Violating Code of Conduct"@en ; @@ -1521,7 +2510,9 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, risk-owl:ViolatingContractualObligation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1529,7 +2520,7 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; skos:prefLabel "Violation of Contractual Obligation"@en ; @@ -1537,7 +2528,9 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, risk-owl:ViolatingEthicsCode a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1545,7 +2538,7 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; skos:prefLabel "Violating Ethics Code"@en ; @@ -1553,7 +2546,9 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, risk-owl:ViolatingLegalObligation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1561,7 +2556,7 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; skos:prefLabel "Violation of Legal Obligations"@en ; @@ -1569,16 +2564,20 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; skos:prefLabel "Violating Policy"@en . risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1586,7 +2585,7 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; skos:prefLabel "Violation of Statutory Obligations"@en ; @@ -1594,7 +2593,10 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, risk-owl:ViolenceAgainstChildren a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1602,7 +2604,7 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Child Violence"@en ; skos:prefLabel "Violence against children"@en ; @@ -1672,6 +2674,7 @@ risk-owl: a owl:Ontology, "http://www.w3.org/2004/02/skos/core" ; dct:contributor "Axel Polleres", "Beatriz Esteves", + "Daniel Doherty", "Delaram Golpayegani", "Fajar Ekaputra", "Georg P. Krog", @@ -1690,7 +2693,7 @@ risk-owl: a owl:Ontology, dct:identifier "https://w3id.org/dpv/risk" ; dct:issued "2022-08-14"@en ; dct:license ; - dct:modified "2024-07-13"@en ; + dct:modified "2024-08-18"@en ; dct:publisher ; dct:source ; dct:title "Risk Concepts"@en ; diff --git a/2.1-dev/risk/modules/risk_consequences-owl.rdf b/2.1-dev/risk/modules/risk_taxonomy-owl.rdf similarity index 57% rename from 2.1-dev/risk/modules/risk_consequences-owl.rdf rename to 2.1-dev/risk/modules/risk_taxonomy-owl.rdf index 9c7cdd832..f350cacd1 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.rdf +++ b/2.1-dev/risk/modules/risk_taxonomy-owl.rdf @@ -12,2039 +12,3089 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - modified - Georg P. Krog, Harshvardhan J. Pandit + + Re-identification + + + + - Fee - DGA 2.10 - Something that acts as or provides fees e.g. for using a service - 2024-08-16 + Something that acts as or causes Re-identification + 2022-08-19 + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2024-04-14 - - - + Harshvardhan J. Pandit accepted 2024-08-16 - Exposure to Harmful Speech - - - - This concept was called "HarmfulSpeech" in DPV 2.0 - 2022-08-17 - - Harshvardhan J. Pandit - Something that acts as or causes Harmful Speech - - + - - + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2022-08-17 + + + - 2022-08-17 - - - Harshvardhan J. Pandit - Something that acts as or causes Physical Assault - accepted + modified 2024-08-16 - Physical Assault - + Something that acts as or causes Violation of Statutory Obligations + Harshvardhan J. Pandit + + Violation of Statutory Obligations + + - + 2024-08-16 - Lose of Negotiating Capacity + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised Data Access + + + + 2022-08-17 - - Harshvardhan J. Pandit + accepted - Something that acts as or causes Loss of Negotiating Capacity - - + Unauthorised Data Access + + - - 2022-08-19 - 2024-08-16 + - + + + + - Harshvardhan J. Pandit - Re-identification - Something that acts as or causes Re-identification - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification accepted - - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + 2024-09-13 + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + ISO/IEC 24027:2021 + - + + 2024-09-13 + - + + + - Something that acts as or causes an attack on security with the aim of undermining it - + Informativeness Bias + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + ISO/IEC 24027:2021 accepted - Security Attack - - - - + + - - Something that acts as or causes Child Violence - 2024-08-16 + + + - + + - Harshvardhan J. Pandit - Violence against children + Out-Group Homogeneity Bias + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + 2024-09-13 accepted - 2022-08-17 - - This concept was called "ChildViolence" in DPV 2.0 - + ISO/IEC 24027:2021 + - + + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data 2024-08-16 + + + + - 2022-08-17 - Something that acts as or causes Loss of Goodwill - Harshvardhan J. Pandit - accepted - Lose of Goodwill - + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 + - - accepted - Risks and issues that affect the reputation of the organisation + + Here equipment refers to physical equipment + Equipment Failure + + + + - Reputational Risk - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - accepted - Something that acts as or causes Component Malfunction - - - - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + Something that acts as or causes Equipment Failure + Harshvardhan J. Pandit + + 2024-08-16 - Component Malfunction - + 2022-08-17 - - Something that acts as or causes Unauthorised Data Disclosure + 2024-08-16 + + + + + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + accepted 2022-08-17 - - Harshvardhan J. Pandit - Unauthorised Data Disclosure - - + - - Something that acts as or causes Component Failure + + + + + + - Component Failure + Something that acts as or causes Unwanted Code Deletion + 2024-08-16 accepted - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of - - + 2022-08-17 + Harshvardhan J. Pandit + + Unwanted Code Deletion + - - + + + + + + - Here equipment refers to physical equipment - Something that acts as or causes Equipment Failure 2024-08-16 - 2022-08-17 - + Harshvardhan J. Pandit - Equipment Failure + + Something that acts as or causes Fraud + Fraud accepted - - - + 2022-08-17 + - - Unauthorised Re-Identification - + + + + + + - Georg P. Krog - 2022-08-19 - 2024-08-16 - - Something that acts as or causes Unauthorised Re-Identification accepted - - + Language Discrimination + Discrimination based on a person's language, often linked to national origin or ethnicity + 2024-09-30 + - + + Harshvardhan J. Pandit - + Here equipment refers to physical equipment + + + + + - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser + 2022-08-17 + Equipment Malfunction accepted - + Something that acts as or causes Equipment Malfunction 2024-08-16 - 2022-08-17 - - - - - 2024-08-16 + + + + - Something that acts as or causes Sabotage - Sabotage - 2022-08-17 - - Harshvardhan J. Pandit + Obstruction of Rights + Interference with or blocking of the exercise of rights accepted - - - + In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + - - Harshvardhan J. Pandit + + + + + + + + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + 2024-09-13 + ISO/IEC 24027:2021 + Bias + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit accepted + + + 2022-08-17 - Something that acts as or causes Account Credentials to be compromised - + accepted + + + + + - Compromise Account Credentials + Identity Fraud + + Something that acts as or causes Identity Fraud + Harshvardhan J. Pandit 2024-08-16 - - - + - + + accepted + + - accepted - 2024-08-16 - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - 2022-08-17 + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement - Harshvardhan J. Pandit - - - + - + + + + + + Risk Concepts - N3 serialiation + + + accepted - - 2024-08-16 + + + - + + 2024-09-30 + Homophobia + Hostility or prejudice against individuals who are or are perceived to be homosexual - Harshvardhan J. Pandit - Psychological Harm - 2022-08-17 - Something that acts as or causes Psychological Harm - + - + + modified + + + + + Something that acts as or causes Interception of Communications + Harshvardhan J. Pandit + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 + + + Intercept Communications 2024-08-16 - Authorisation Failure - Something that acts as or causes Authorisation Failure - + + + + + + + + + + Discrimination based on a person's biological sex + + Sex Discrimination accepted + 2024-09-30 + + + + 2022-08-17 + accepted + + + + + + + Something that acts as or causes Cryptojacking + 2024-08-16 Harshvardhan J. Pandit - - - + Cryptojacking + - + + + - + + - accepted - Something that involves or causes judicial penalties to be paid + Non-Response Bias + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + ISO/IEC 24027:2021 - Judicial Penalty - + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + accepted + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - - + + + + + + + - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - Something that acts as or causes Non-Material Damage + - Harshvardhan J. Pandit - accepted 2024-08-16 - Non-Material Damage - - - Harshvardhan J. Pandit - + Unauthorised Code Access 2022-08-17 - - - - - Something that acts as or causes Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Access accepted - 2024-08-16 - Unauthorised Code Disclosure - - + - - 2024-08-16 + + + + + - 2022-08-17 + This concept was called "ChildViolence" in DPV 2.0 + accepted + 2024-08-16 + Something that acts as or causes Child Violence Harshvardhan J. Pandit - Malware Attack - accepted - - Something that acts as or causes Malware Attack - - - - + Violence against children + 2022-08-17 + - - + + ISO/IEC 24027:2021 + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Sampling Bias + accepted + + + + - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - 2024-08-16 + Bias that occurs when data records are not collected randomly from the intended population - Harshvardhan J. Pandit - - Brute Force Authorisations - accepted - 2022-08-17 - - - + - + + - Accidental Misuse + Concepts associated with security threats that are likely to originate externally accepted - Accidental Misuse - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + External Security Threat + - + + + + + + - Unauthorised Access to Premises 2022-08-17 - + Something that acts as or causes Malicious Code Attack Harshvardhan J. Pandit + + accepted - Something that acts as or causes Unauthorised Access to Premises + Malicious Code Attack 2024-08-16 - - - - - + - - - + + This concept was called "ViolationCodeConduct" in DPV 2.0 + + + - accepted - Something that acts as or causes Unauthorised Data Modification - Unauthorised Data Modification - 2024-08-16 - 2022-08-17 + + modified + Something that acts as or causes Violation of Code of Conduct Harshvardhan J. Pandit - - + 2024-08-16 + Violating Code of Conduct + 2022-08-17 + - - - - - Risks and issues that affect or have the potential to affect specific individuals - accepted - Individual Risk + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - - Here equipment refers to physical equipment - - accepted - 2022-08-17 - + + Something that acts as or causes Discrimination + Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + + + + + - Equipment Malfunction + accepted + 2022-08-19 + 2024-09-30 2024-08-16 + Discrimination + Georg P. Krog - Harshvardhan J. Pandit - Something that acts as or causes Equipment Malfunction - - + + - - accepted - 2022-08-17 - 2024-08-16 + + + + - - Harshvardhan J. Pandit - Something that acts as or causes System Intrusion - System Intrusion + accepted + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large - - - - + - - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - 2024-08-16 + + 2022-03-23 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Something that acts as or causes Detriment + Detriment + + + - - Harshvardhan J. Pandit accepted - 2022-08-17 - - + 2024-08-16 + - - ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - Detriment + + + + - Something that acts as or causes Detriment - 2022-03-23 - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - 2024-08-16 - accepted - + Physical Harm + accepted + - - + + Something that acts as or causes an attack on security with the aim of undermining it + + + + + + - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - Something that acts as or causes benefits - 2022-03-23 + Security Attack accepted - Benefit - 2024-08-16 - + - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + 2024-09-13 + ISO/IEC 24027:2021 + Non-Normality Bias + + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + - + + + + - 2024-06-11 - accepted - Misuse - Something that acts as or causes Misuse - 2024-08-16 - Delaram Golpayegani - + Judicial Penalty + accepted + Something that involves or causes judicial penalties to be paid + - - 2024-08-16 - Limitation of Rights + + + + + + - 2022-08-18 - This concept was called "LimitationOfRights" in DPV 2.0 + + Malware Attack + 2024-08-16 + Harshvardhan J. Pandit + 2022-08-17 accepted - Something that acts as or causes Limitation of Rights - Georg P. Krog, Harshvardhan J. Pandit - + Something that acts as or causes Malware Attack + - - Something that acts as or causes Denial of Service Attack (DoS) + + + + + + + - Harshvardhan J. Pandit - Denial of Service Attack (DoS) + Societal Health & Safety accepted - 2022-08-17 - 2024-08-16 + + + + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when a human makes an association or assumption based on their mental models and memories + - + + + - - - - - accepted - 2022-08-17 + Implicit Bias + ISO/IEC 24027:2021 + + + + + Harshvardhan J. Pandit 2024-08-16 - + + + + + - Something that acts as or causes Malicious Code Attack + Sabotage + 2022-08-17 + accepted + + Something that acts as or causes Sabotage - Harshvardhan J. Pandit - Malicious Code Attack - - - - + - + + + + - Something that acts as or causes Scam + 2022-03-30 + accepted + Something that acts as or causes Damage + Damage + Harshvardhan J. Pandit 2024-08-16 - - 2022-08-17 - Harshvardhan J. Pandit - accepted - Scam - - - - - ENISa Trust Services Security Incidents 2021 - - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + - - Harshvardhan J. Pandit + + 2024-09-30 + + + + + + + Direct Discrimination + accepted - 2022-08-17 + Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + + + + + + - Something that acts as or causes Security Breach - - Security Breach - 2024-08-16 - - - - - - - - - - - Something that acts as or causes Social Disadvantage + 2022-08-17 + Harshvardhan J. Pandit + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) accepted + 2024-08-16 - Georg P. Krog - Social Disadvantage - 2022-08-19 - - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + - + + + + + + Harshvardhan J. Pandit accepted - Intentional Misuse - Intentional Misuse + 2022-08-17 + Something that acts as or causes Coercion + Coercion + 2024-08-16 + - + - - Unwanted Code Deletion - - Harshvardhan J. Pandit + + + Risk Concepts - JSON-LD serialiation + + + + + + + + + + Something that acts as or causes Loss of Negotiating Capacity accepted - Something that acts as or causes Unwanted Code Deletion - - 2022-08-17 + Lose of Negotiating Capacity + + Harshvardhan J. Pandit 2024-08-16 - - - + + 2022-08-17 + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - 2024-08-16 - This concept was called "ViolationEthicalCode" in DPV 2.0 - 2022-08-17 - - Harshvardhan J. Pandit + + + + - - Something that acts as or causes Violation of Ethics Code - Violating Ethics Code - modified - - - - Harshvardhan J. Pandit - Unwanted Disclosure of Data - 2022-08-17 - + accepted + Judicial Costs + Something that involves or causes judicial costs to be paid + + + + + + + + - Something that acts as or causes Unwanted Disclosure of Data - accepted - 2024-08-16 - - - - + + Something that acts as or causes Extorsion + 2022-08-17 + + Extorsion accepted - 2024-08-16 + Harshvardhan J. Pandit + + + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + + + + + + - + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + 2024-09-13 + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + Confirmation Bias + ISO/IEC 24027:2021 - 2024-04-14 - Something that acts as or provides renumeration which is in monetary or financial form - Georg P. Krog, Harshvardhan J. Pandit - Remuneration - + - - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - 2024-08-16 + + + + + + - - Harshvardhan J. Pandit - Distributed Denial of Service Attack (DDoS) + + Something that acts as or causes Spoofing accepted + 2024-08-16 + + Spoofing 2022-08-17 - - - + Harshvardhan J. Pandit + - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - 2024-08-16 - Terrorism - + + accepted + + + + - + Something that acts as or causes Harm to humans + 2024-08-16 Harshvardhan J. Pandit - accepted - 2022-08-17 - Something that acts as or causes Terrorism - - - - - - - - - Risk Concepts - RDF/XML serialiation - + 2022-08-13 + This concept refers to the general abstract notion of harm + + Harm + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + + + + - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification - - 2022-08-17 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + 2024-09-13 + Rule-Based System Design + ISO/IEC 24027:2021 - Harshvardhan J. Pandit + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design accepted - 2024-08-16 - - + Rule based system design also potentially introduces various forms of human cognitive bias + - - 2022-08-17 - accepted - + + 2022-03-23 + + + + - - 2024-08-16 - Something that acts as or causes Identity Theft - Identity Theft + Something that acts as or causes benefits - Harshvardhan J. Pandit - - + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + 2024-08-16 + accepted + Benefit + - - + + + + + + + + + 2024-08-16 - + Something that acts as or causes a compromised account that is then used by the compromiser Harshvardhan J. Pandit - Intercept Communications - This concept was called "InterceptionCommunications" in DPV 2.0 2022-08-17 - Something that acts as or causes Interception of Communications - modified - + Compromise Account + accepted - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - + 2022-08-17 + Something that acts as or causes Unauthorised Code Disclosure + accepted + + + + - This concept was called "ViolationCodeConduct" in DPV 2.0 - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct - + + Unauthorised Code Disclosure + Harshvardhan J. Pandit 2024-08-16 - modified - Harshvardhan J. Pandit - + - - modified + + + 2022-08-17 + Harshvardhan J. Pandit + + + + - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - 2024-08-16 - 2022-08-17 + modified + This concept was called "Corruption Data" in DPV 2.0 + Something that acts as or causes Corruption of Data - - Harshvardhan J. Pandit - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - 2024-08-16 - + Data Corruption + + + + Something that acts as or causes Injury + accepted + 2022-08-17 + + + + + 2024-08-16 + Injury Harshvardhan J. Pandit - Lose of Credibility - - Something that acts as or causes Loss of Credibility - accepted - 2022-08-17 - + + - - + + 2022-08-17 + + + + - 2022-08-17 + 2024-08-16 + + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity Harshvardhan J. Pandit - Something that acts as or causes Loss of Reputation accepted - Lose of Reputation - - 2024-08-16 - + Financial Loss + - - + + Something that acts as or causes Component Malfunction + accepted + + + + + + Component Malfunction + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - - + - - 2024-08-16 + + ENISA Threat Taxonomy 2016 + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + Risk Concepts - Turtle serialiation + + + + + + + + - Payment + 2024-08-16 - 2024-04-14 accepted - Something that acts as or provides payment e.g. to access a service or purchase resources + Reward Georg P. Krog, Harshvardhan J. Pandit - + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + 2024-04-14 + - - + + accepted + + + + + - Lose of Trust - Something that acts as or causes Loss of Trust - 2022-08-17 + + Something that acts as or causes Phishing Scam + Phishing Scam - accepted + Harshvardhan J. Pandit 2024-08-16 + 2022-08-17 + + + + 2022-08-17 Harshvardhan J. Pandit - - + + + + + + + + accepted + Something that acts as or causes Scam + 2024-08-16 + Scam + + + - - + + + + + + + + Something that acts as or causes System Intrusion + 2024-08-16 Harshvardhan J. Pandit - - accepted - Something that acts as or causes Data Breach 2022-08-17 - 2024-08-16 - Data Breach - - - - + System Intrusion + - - Something that acts as or causes Sexual Violence + + + + + + + + Excellence Discrimination + 2024-09-30 accepted - 2024-08-16 - + + Favoritism towards individuals deemed more competent or superior, often at the expense of others + + + + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + + + + + + accepted + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Societal Bias + ISO/IEC 24027:2021 + + + + + + + - Sexual Violence + Something that acts as or causes Sexual Violence + Sexual Violence + 2024-08-16 Harshvardhan J. Pandit + accepted 2022-08-17 - + + - - Here system refers to both hardware and software systems - + + accepted + Denial of Rights + + + + + + + The refusal or withholding or denial of the existence or applicability of rights + The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + 2022-08-17 + + + + + + accepted + Something that acts as or causes Public Order Breach + Public Order Breach 2024-08-16 + Harshvardhan J. Pandit + + + + + 2024-09-30 + + + + + + + + accepted + Discrimination based on a person's nationality or citizenship + Nationality Discrimination + + + + Things that cause or have the potential to impact financial resources + + + + accepted + + Financial Impact + + + + + + + + + + + Something that acts as or causes Loss of Goodwill 2022-08-17 + Lose of Goodwill + accepted + 2024-08-16 Harshvardhan J. Pandit - System Failure + + + accepted - Something that acts as or causes System Failure - - + 2022-08-18 + + + + + + + + This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2024-08-16 + Violation of Rights + The infringement or breach of rights in a manner that constitues a 'violation' of those rights + Georg P. Krog, Harshvardhan J. Pandit + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - + + 2024-08-16 + 2022-08-17 + Harshvardhan J. Pandit + Violation of Legal Obligations + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + + + - - Something that acts as or causes Violation of Statutory Obligations + + Something that acts as or causes Violation of Legal Obligations modified - This concept was called "ViolationStatutoryObligations" in DPV 2.0 + + + + accepted + + 2022-08-17 + + + + + + + Something that acts as or causes Erroneous System Use + Harshvardhan J. Pandit + Erroneous System Use 2024-08-16 + + + + 2022-08-17 + + + + + + + + + accepted - Violation of Statutory Obligations + Something that acts as or causes Blackmail Harshvardhan J. Pandit - + 2024-08-16 + Blackmail + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + 2022-08-17 - - - + Unauthorised Access to Premises + + + + + + + accepted + Something that acts as or causes Unauthorised Access to Premises + Harshvardhan J. Pandit 2024-08-16 - Spoofing + + + + + + + + + + + + 2024-08-16 Harshvardhan J. Pandit - Something that acts as or causes Spoofing + + accepted + Human Errors + 2022-08-17 + Something that acts as or causes Human Errors + + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + + + + + + + + Component Failure + accepted + Something that acts as or causes Component Failure + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of - - - - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ENISA Reference Incident Classification Taxonomy 2018 + + + + + Risks and issues that arise during operational processes + + Operational Security Risk accepted - - Identity Fraud - Something that acts as or causes Identity Fraud + + + + Risk Concepts - HTML serialiation + + + + + + + + + + + + + + Risks and issues that affect or have the potential to affect specific individuals + accepted + Individual Risk + + + + + + + + 2024-08-16 + + Lose of Trust + Harshvardhan J. Pandit + + accepted 2022-08-17 + Something that acts as or causes Loss of Trust + + + + The gradual weakening or reduction of the scope and protection of rights + + + + + + + accepted + Erosion of Rights + + Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + + + + + + + + + SexualOrientation Discrimination + + 2024-09-30 + accepted + Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + + + + Something that acts as or causes Unwanted Data Deletion + 2024-08-16 + + + + + + + + + Harshvardhan J. Pandit - - + accepted + 2022-08-17 + Unwanted Data Deletion + - - + + Something that acts as or causes Psychological Harm + Harshvardhan J. Pandit + accepted + 2022-08-17 + + + + + + + + Psychological Harm + 2024-08-16 + + + + + + + + + + + + Malicious Activity + Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + accepted + + + 2024-08-16 + + + + + + + 2022-08-17 + Harshvardhan J. Pandit + Something that acts as or causes Terrorism + + Terrorism + accepted + + + + + + + + + + + + Something that acts as or causes Unwanted Disclosure of Data + 2024-08-16 Harshvardhan J. Pandit - Violation of Contractual Obligation + Unwanted Disclosure of Data + accepted + 2022-08-17 + + + + + + + + Examples for Data Privacy Vocabulary + + + + + + + + + + + accepted + Racial Discrimination + Discrimination against individuals because of their racial background or skin color + 2024-09-30 + + + + + + - This concept was called "ViolationContractualObligations" in DPV 2.0 - modified - Something that acts as or causes Violation of Contractual Obligations - + Georg P. Krog, Harshvardhan J. Pandit + 2022-08-18 + This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2024-08-16 + + Prevent Exercising of Rights + accepted + Actions or measures that prevent an individual or group from exercising their legal rights. + - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + ISO/IEC 24027:2021 + + + + + + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + Confounding Variables Bias + accepted + 2024-09-13 + - + + accepted + + + + + + + 2024-09-30 + Misandry + + Dislike, contempt, or prejudice against men + + + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - 2024-08-16 - Something that acts as or causes Human Errors + + + + - Harshvardhan J. Pandit + Privacy accepted - 2022-08-17 - Human Errors - - + - - - Julian Flake - Fajar Ekaputra + + Something that acts as or causes Unauthorised System Modification + + + + + + + + Unauthorised System Modification + + + 2024-08-16 Harshvardhan J. Pandit - Beatriz Esteves - Axel Polleres + 2022-08-17 + accepted + + + + + + + + + + + 2022-08-19 + + Unauthorised Re-Identification + 2024-08-16 + accepted Georg P. Krog - Delaram Golpayegani - Paul Ryan - Georg P. Krog - Delaram Golpayegani - Harshvardhan J. Pandit - Beatriz Esteves - Rob Brennan - Julian Flake - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - - - - 10.5281/zenodo.12505841 - - - - - - - - - - - - - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - http://purl.org/ontology/bibo/status/published - 2022-08-14 - https://w3id.org/dpv/risk - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2.1-dev - - 2022-08-14 - - - RISK - risk - 2.1-dev - 2024-07-13 - Risk Concepts - https://w3id.org/dpv/risk# + Something that acts as or causes Unauthorised Re-Identification + - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + + Something that acts as or causes Misuse + + + + + + + 2024-06-11 + accepted + Delaram Golpayegani + + Misuse + 2024-08-16 + - + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Landscape for Ransomware Attacks 2022 - + - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - Damage - Something that acts as or causes Damage - accepted - 2022-03-30 + + + + + + Harshvardhan J. Pandit + Compromise Account Credentials + + Something that acts as or causes Account Credentials to be compromised 2024-08-16 + accepted + 2022-08-17 + + + + + The criteria for what is considered material damage is based in jurisdictional laws and norms + Something that acts as or causes Material Damage + + + + + + + 2024-08-16 + accepted + Material Damage Harshvardhan J. Pandit + 2022-03-30 - + + + 2022-08-17 + Harshvardhan J. Pandit + + + + + + + + + accepted + Something that acts as or causes Identity Theft + Identity Theft 2024-08-16 + + + + Discrimination based on a person's geographical origin or residence + + + + + + + Geographic Discrimination + 2024-09-30 + accepted + + + + + + + + + + accepted + + + Harshvardhan J. Pandit - + 2024-08-16 + Copyright Violation + + + + + + + Something that acts as or causes Copyright Violation accepted 2022-08-17 + + + + + + + + + + + 2024-09-30 + accepted - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion - - - + Prejudice or discrimination against people based on their race + Racism + - + + Harshvardhan J. Pandit + 2024-08-16 + + + + + + + 2022-08-17 + accepted + + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + + + + + + + + Gender Discrimination + 2024-09-30 + + Discrimination based on a person's gender identity or gender expression + accepted + + + + + + + + + + - Something that acts as or causes Phishing Scam - accepted 2022-08-17 2024-08-16 - Phishing Scam + Something that acts as or causes Data Breach + + + + + Data Breach Harshvardhan J. Pandit - - + - + + + + - Harshvardhan J. Pandit 2022-08-17 - Cryptojacking - - Something that acts as or causes Cryptojacking accepted + + This concept was called "HarmfulSpeech" in DPV 2.0 + Harshvardhan J. Pandit + Something that acts as or causes Harmful Speech 2024-08-16 - - + Exposure to Harmful Speech + - - Something that acts as or causes Injury - accepted - 2022-08-17 + + Individual Health & Safety - Harshvardhan J. Pandit - + + + - Injury - 2024-08-16 + accepted - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - + + 2024-08-16 + + + + + + + + + Something that acts as or causes Unauthorised Data Disclosure + Unauthorised Data Disclosure + Harshvardhan J. Pandit accepted + 2022-08-17 - - + + + + + + + + - Unauthorised System Access + accepted + Something that acts as or causes System Failure + 2024-08-16 + System Failure + 2022-08-17 Harshvardhan J. Pandit - Something that acts as or causes Unauthorised System Access - - - + Here system refers to both hardware and software systems + - + + + + + + + + In-Group Bias + ISO/IEC 24027:2021 + Bias that occurs when showing partiality to one's own group or own characteristics + + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + accepted + + + + Dislike, contempt, or prejudice against women + + + + + + + 2024-09-30 + accepted + + Misogyny + + + + + + + + + + + accepted + Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + 2024-09-30 + Reverse Discrimination + + + + + + - Blackmail + 2024-08-16 + Something that acts as or provides payment e.g. to access a service or purchase resources + + Payment + Georg P. Krog, Harshvardhan J. Pandit + accepted + 2024-04-14 + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + + 2024-09-30 + accepted + Transphobia + Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + + + + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 + + + + + + + + Harshvardhan J. Pandit + + Physical Assault + + Something that acts as or causes Physical Assault accepted 2022-08-17 - Something that acts as or causes Blackmail - 2024-08-16 - - + - - Something that acts as or causes Unauthorised Code Access + + 2022-08-17 + Harshvardhan J. Pandit + + + + + + + accepted + This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + Impact to Rights + 2024-08-16 + Something that acts as or causes Impact to Rights + + + + + accepted + + + + + + - + Harshvardhan J. Pandit 2024-08-16 2022-08-17 + Something that acts as or causes Security Breach + + Security Breach + + + + 2022-08-17 + Something that acts as or causes Violation of Ethics Code + + + + + + Violating Ethics Code + + modified + 2024-08-16 + This concept was called "ViolationEthicalCode" in DPV 2.0 Harshvardhan J. Pandit - accepted - Unauthorised Code Access - - - + + - + + Discrimination based on a person's age, often impacting older or younger individuals + + + + + + accepted + 2024-09-30 + Age Discrimination + + + + - 2024-04-14 + + + - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - Reward 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - + accepted + 2022-08-17 + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + Harshvardhan J. Pandit + - - Environmental Risk + + + + + - - - Risks and issues that have their origin in environment or can affect the environment at large accepted - + 2024-09-30 + Religious Discrimination + Discrimination based on a person's religious beliefs or practices + + - - Copyright Violation - Something that acts as or causes Copyright Violation + + + + + + + 2024-08-16 accepted 2022-08-17 - Harshvardhan J. Pandit - - 2024-08-16 - + Something that acts as or causes System Malfunction + System Malfunction + Here system refers to both hardware and software systems + + - + + accepted + + + + - Something that involves or causes judicial costs to be paid - Judicial Costs - accepted - + - - Unauthorised System Modification - + + + + + + Guides for Data Privacy Vocabulary + + + + ISO/IEC 24027:2021 + - + + + - Something that acts as or causes Unauthorised System Modification - 2024-08-16 - Harshvardhan J. Pandit + 2024-09-13 accepted - 2022-08-17 - - + Selection Bias + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + https://w3id.org/dpv/risk# + http://www.w3.org/2004/02/skos/core + http://www.w3.org/2000/01/rdf-schema + + 2022-08-14 + + + + + + + + + RISK + Daniel Doherty + Georg P. Krog + Julian Flake + Fajar Ekaputra + Harshvardhan J. Pandit + Axel Polleres + Delaram Golpayegani + Beatriz Esteves + + 2022-08-14 + Harshvardhan J. Pandit + Julian Flake + Delaram Golpayegani + Beatriz Esteves + Rob Brennan + Georg P. Krog + Paul Ryan + 2.1-dev + + + + + + + http://purl.org/ontology/bibo/status/published + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + 2.1-dev + + Risk Concepts + 10.5281/zenodo.12505841 + risk + 2024-08-18 + + https://w3id.org/dpv/risk + + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - + + 2024-08-16 + + + - Georg P. Krog, Harshvardhan J. Pandit - Violation of Rights - 2022-08-18 - This concept was called "ViolationOfRights" in DPV 2.0 - Something that acts as or causes Violation of Rights accepted - 2024-08-16 + Social Disadvantage + Georg P. Krog + 2022-08-19 + Something that acts as or causes Social Disadvantage - + + + + - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - 2024-08-16 - - - Harshvardhan J. Pandit - accepted + + Something that acts as or causes Violation of Contractual Obligations 2022-08-17 - - + modified + This concept was called "ViolationContractualObligations" in DPV 2.0 + Violation of Contractual Obligation + Harshvardhan J. Pandit + 2024-08-16 + - - + + + + + accepted - Concepts associated with security threats that are likely to originate externally + 2024-04-14 + 2024-08-16 + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + Georg P. Krog, Harshvardhan J. Pandit - External Security Threat - + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + + + Primer for Data Privacy Vocabulary + + + - - https://www.iso.org/standard/75281.html + - ISO/IEC 27005:2018 + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - Individual Health & Safety + + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised Resource Use + 2024-08-16 + accepted + 2022-08-17 + Unauthorised Resource Use + + + + - accepted - + + - - Something that acts as or causes Fraud - accepted - 2024-08-16 - + + + - - - Harshvardhan J. Pandit - Fraud - - 2022-08-17 - - - - - Harshvardhan J. Pandit - - Public Order Breach - + - - accepted - Something that acts as or causes Public Order Breach - 2022-08-17 + 2024-08-16 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + A limitation or restrictions on the scope or exercise of rights + Limitation of Rights + This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Georg P. Krog, Harshvardhan J. Pandit + 2022-08-18 + accepted + - + + - + + + - - Something that acts as or causes Illegal Processing of Data - Illegal Data Processing - 2024-08-16 + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit accepted - 2022-08-17 + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + ISO/IEC 24027:2021 - Harshvardhan J. Pandit - This concept was called "IllegalProcessingData" in DPV 2.0 - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + Group Attribution Bias + - + accepted - Risks and issues that have their basis in legal requirements and enforcement + + + - + - Legal Risk + 2024-09-30 - + Sexism + Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + accepted - 2022-08-17 - 2024-08-16 - + + + + + Accidental Misuse + Accidental Misuse - Harshvardhan J. Pandit - - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - + - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + + + + + + + 2024-09-13 + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + ISO/IEC 24027:2021 + Data Aggregation Bias + accepted + + - + + ISO/IEC 27005:2018 - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 accepted - + + + - Something that acts as or causes violation of policy which can be either internal or external policy - Violating Policy - + + Something that acts as or causes violation of policy which can be either internal or external policy + - - + + + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + + + + - accepted - Risks and issues that affect or have the potential to affect society at large or specific groups in society - Societal Risk - - - - + Harshvardhan J. Pandit + + 2022-08-17 accepted 2024-08-16 + Brute Force Authorisations + + + + + + + + + + Something that acts as or causes Unauthorised Activity - Harshvardhan J. Pandit - - 2022-08-17 - Something that acts as or causes Extorsion - Extorsion + accepted + Unauthorised Activity - - + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 + + + + - + + + + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + ISO/IEC 24027:2021 + Data Bias accepted - - + - - Impact to Rights - + + + + + - accepted + Lose of Credibility + Harshvardhan J. Pandit + Something that acts as or causes Loss of Credibility 2022-08-17 - Harshvardhan J. Pandit - This concept was called "ImpactToRights" in DPV 2.0 - Something that acts as or causes Impact to Rights - + accepted + 2024-08-16 - - + - - 2022-08-17 + 2024-08-16 - modified - This concept was called "Corruption Data" in DPV 2.0 + + Unauthorised Information Disclosure + + + + - Data Corruption - - Something that acts as or causes Corruption of Data + Harshvardhan J. Pandit - - - + accepted + 2022-08-17 + Something that acts as or causes Unauthorised Information Disclosure + - + + accepted + + + User Risks + Concepts associated with risks that arise due to User or Human use - Privacy - accepted - + - - The criteria for what is considered material damage is based in jurisdictional laws and norms - Something that acts as or causes Material Damage - accepted - 2024-08-16 - + + + + + + - 2022-03-30 - Material Damage - - Harshvardhan J. Pandit - + Harassment + accepted + - - Harm - This concept refers to the general abstract notion of harm + + + + - Something that acts as or causes Harm to humans - 2024-08-16 + Unfulfilment of Rights + Failure to meet or complete the fulfilment of rights - Harshvardhan J. Pandit - 2022-08-13 + Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - + - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - Something that acts as or causes Erroneous System Use - accepted - 2022-08-17 - 2024-08-16 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + + + + - + 2022-08-17 + + accepted + Something that acts as or causes Authorisation Failure Harshvardhan J. Pandit - - Erroneous System Use - + Authorisation Failure + + 2024-08-16 + + + + ENISA Threat Taxonomy 2016 + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - accepted - Something that acts as or causes Loss of Opportunity - 2024-08-16 - + + Georg P. Krog, Harshvardhan J. Pandit + + + + + accepted + Something that acts as or provides renumeration which is in monetary or financial form + 2024-04-14 + Remuneration + 2024-08-16 - Harshvardhan J. Pandit - Lose of Opportunity - - 2022-08-17 - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ENISA Reference Incident Classification Taxonomy 2018 + + + 2024-09-30 + - + + + - Societal Health & Safety accepted - + Discrimination based on a person's caste, a form of social stratification found in some cultures + Caste Discrimination + - - + + + + + - Georg P. Krog, Harshvardhan J. Pandit + accepted - This concept was called "PreventExercisingOfRights" in DPV 2.0 - 2024-08-16 - Something that acts as or causes Prevent Exercising of Rights - 2022-08-18 - Prevent Exercising of Rights - + Something that acts as or causes Denial of Service Attack (DoS) + 2024-08-16 + Harshvardhan J. Pandit + Denial of Service Attack (DoS) + 2022-08-17 + - + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + + + Risk Concepts - RDF/XML serialiation + + + - - + + - + + + + + ISO 20501:2019 + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + 2024-09-13 + Statistical Bias accepted - Operational Security Risk - Risks and issues that arise during operational processes - + - + + + + + + + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + accepted + Simpson'S Paradox Bias + 2024-09-13 + ISO/IEC 24027:2021 + + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + + + + + Something that acts as or causes Loss of Customer Confidence + accepted + Lose of Customer Confidence 2024-08-16 - Something that acts as or causes Coercion - - Coercion + Harshvardhan J. Pandit + 2022-08-17 + + + + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + + + + + + + + 2024-08-16 Harshvardhan J. Pandit - accepted + Something that acts as or causes Unauthorised System Access 2022-08-17 - - + + accepted + Unauthorised System Access + + - + - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - + + + + - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms + 2022-08-17 + Lose of Reputation accepted - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit + - 2024-04-14 - + 2024-08-16 + Something that acts as or causes Loss of Reputation + Harshvardhan J. Pandit + - - - - - - - Risk Concepts - JSON-LD serialiation + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + + + - Unauthorised Resource Use + Reputational Risk + Risks and issues that affect the reputation of the organisation accepted - Something that acts as or causes Unauthorised Resource Use - - 2024-08-16 - 2022-08-17 - Harshvardhan J. Pandit - - + + + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + + + Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + accepted + 2024-09-30 + + Indirect Discrimination + + + + + + + + + + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Requirements bias also represents occasions for the human cognitive biases to manifest + accepted + Bias that occurs in or during requirements creation + ISO/IEC 24027:2021 + Requirements Bias + + - + + + + - Something that acts as or causes Loss of Customer Confidence - Lose of Customer Confidence - 2024-08-16 - - 2022-08-17 + 2024-08-16 Harshvardhan J. Pandit accepted - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + 2022-03-30 + Non-Material Damage + Something that acts as or causes Non-Material Damage + The criteria for what is considered material damage is based in jurisdictional laws and norms + - - + + + + + accepted + 2024-09-30 + Discrimination against individuals based on their ethnicity or cultural heritage + Ethnic Discrimination - Financial Impact - Things that cause or have the potential to impact financial resources - + - - - accepted - 2022-08-17 - 2024-08-16 + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + + + + - Something that acts as or causes Confidentiality Breach - Confidentiality Breach - - Harshvardhan J. Pandit - - + accepted + Intentional Misuse + Intentional Misuse + - - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + ENISA Methodology for Sectoral Cybersecurity Assessments + + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 24027:2021 + Bias that occurs when humans are processing and interpreting information + + + + - Here system refers to both hardware and software systems + + Cognitive Bias accepted + 2024-09-13 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + + Something that acts as or causes Unauthorised Code Modification 2024-08-16 - System Malfunction - - 2022-08-17 + 2022-08-17 Harshvardhan J. Pandit - Something that acts as or causes System Malfunction - - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - Risk Concepts - Turtle serialiation - - - - - - - - Primer for Data Privacy Vocabulary - - - - - + accepted + + Unauthorised Code Modification + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - Something that acts as or causes Discrimination - 2022-08-19 + + + + + 2024-08-16 + Harshvardhan J. Pandit + Something that acts as or causes Confidentiality Breach + Confidentiality Breach + 2022-08-17 accepted - Discrimination - Georg P. Krog - + + - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - Unauthorised Activity + + + + - accepted - Something that acts as or causes Unauthorised Activity - - - - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + Sexual Harassment + accepted + - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - Risk Concepts - N3 serialiation - - - - - - - accepted + + + + - User Risks - Concepts associated with risks that arise due to User or Human use + Societal Risk + accepted + Risks and issues that affect or have the potential to affect society at large or specific groups in society - + + https://www.iso.org/standard/75281.html - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + ISO/IEC 27005:2018 - - - - - - Examples for Data Privacy Vocabulary - + + 2024-09-13 + + + + + + + ISO/IEC 24027:2021 + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + + Data Processing Bias + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + accepted + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + Disability Discrimination + Discrimination against individuals based on physical or mental disabilities + + + + + + + + 2024-09-30 + accepted + - + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Landscape for Ransomware Attacks 2022 - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - + - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Landscape for Ransomware Attacks 2022 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - accepted - - - - Physical Harm - - - - + - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - - - - - Guides for Data Privacy Vocabulary - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - Risk Concepts - HTML serialiation - - - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + - + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + ENISA Threat Landscape for Ransomware Attacks 2022 - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments diff --git a/2.1-dev/risk/modules/risk_consequences-owl.ttl b/2.1-dev/risk/modules/risk_taxonomy-owl.ttl similarity index 54% rename from 2.1-dev/risk/modules/risk_consequences-owl.ttl rename to 2.1-dev/risk/modules/risk_taxonomy-owl.ttl index 1fdb2d194..1dc03ef44 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.ttl +++ b/2.1-dev/risk/modules/risk_taxonomy-owl.ttl @@ -17,16 +17,36 @@ risk-owl:AccidentalMisuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:UserRisks ; + rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; skos:definition "Accidental Misuse"@en ; skos:prefLabel "Accidental Misuse"@en . +risk-owl:AgeDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's age, often impacting older or younger individuals"@en ; + skos:prefLabel "Age Discrimination"@en . + risk-owl:AuthorisationFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -34,36 +54,59 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:Benefit a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Compensation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . +risk-owl:Bias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:prefLabel "Bias"@en . + risk-owl:Blackmail a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -71,15 +114,18 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -87,16 +133,31 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . +risk-owl:CasteDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's caste, a form of social stratification found in some cultures"@en ; + skos:prefLabel "Caste Discrimination"@en . + risk-owl:Coercion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -104,30 +165,50 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . +risk-owl:CognitiveBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:prefLabel "Cognitive Bias"@en . + risk-owl:Compensation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:prefLabel "Compensation"@en . risk-owl:ComponentFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -135,10 +216,13 @@ risk-owl:ComponentFailure a rdfs:Class, risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -146,7 +230,13 @@ risk-owl:ComponentMalfunction a rdfs:Class, risk-owl:CompromiseAccount a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -154,17 +244,18 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . risk-owl:CompromiseAccountCredentials a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -172,15 +263,18 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -188,15 +282,46 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . +risk-owl:ConfirmationBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:prefLabel "Confirmation Bias"@en . + +risk-owl:ConfoundingVariablesBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:prefLabel "Confounding Variables Bias"@en . + risk-owl:CopyrightViolation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -204,14 +329,32 @@ risk-owl:CopyrightViolation a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . +risk-owl:CoverageBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:prefLabel "Coverage Bias"@en . + risk-owl:Cryptojacking a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -219,15 +362,17 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . risk-owl:Damage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -237,9 +382,45 @@ risk-owl:Damage a rdfs:Class, skos:definition "Something that acts as or causes Damage"@en ; skos:prefLabel "Damage"@en . +risk-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + risk-owl:DataBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -249,17 +430,18 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . risk-owl:DataCorruption a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -267,16 +449,33 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . +risk-owl:DataProcessingBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:prefLabel "Data Processing Bias"@en . + risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -284,15 +483,16 @@ risk-owl:DenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:Detriment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -302,21 +502,57 @@ risk-owl:Detriment a rdfs:Class, skos:definition "Something that acts as or causes Detriment"@en ; skos:prefLabel "Detriment"@en . +risk-owl:DirectDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)"@en ; + skos:prefLabel "Direct Discrimination"@en . + +risk-owl:DisabilityDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals based on physical or mental disabilities"@en ; + skos:prefLabel "Disability Discrimination"@en . + risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dct:created "2022-08-19"^^xsd:date, + "2024-09-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RiskConcept, + risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Discrimination"@en ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, + "Something that acts as or causes Discrimination"@en ; skos:prefLabel "Discrimination"@en . risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -324,15 +560,17 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:DenialServiceAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . risk-owl:EnvironmentalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -341,7 +579,11 @@ risk-owl:EnvironmentalRisk a rdfs:Class, risk-owl:EquipmentFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -349,8 +591,7 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -358,7 +599,11 @@ risk-owl:EquipmentFailure a rdfs:Class, risk-owl:EquipmentMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -366,8 +611,7 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -375,7 +619,10 @@ risk-owl:EquipmentMalfunction a rdfs:Class, risk-owl:ErroneousSystemUse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -388,9 +635,38 @@ risk-owl:ErroneousSystemUse a rdfs:Class, skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:prefLabel "Erroneous System Use"@en . +risk-owl:EthnicDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Racism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals based on their ethnicity or cultural heritage"@en ; + skos:prefLabel "Ethnic Discrimination"@en . + +risk-owl:ExcellenceDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Favoritism towards individuals deemed more competent or superior, often at the expense of others"@en ; + skos:prefLabel "Excellence Discrimination"@en . + risk-owl:ExposureToHarmfulSpeech a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -406,7 +682,8 @@ risk-owl:ExposureToHarmfulSpeech a rdfs:Class, risk-owl:ExternalSecurityThreat a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -415,7 +692,11 @@ risk-owl:ExternalSecurityThreat a rdfs:Class, risk-owl:Extorsion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -423,28 +704,17 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . -risk-owl:Fee a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source "DGA 2.10"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; - sw:term_status "modified"@en ; - skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; - skos:prefLabel "Fee"@en . - risk-owl:FinancialImpact a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -453,7 +723,10 @@ risk-owl:FinancialImpact a rdfs:Class, risk-owl:FinancialLoss a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -468,7 +741,11 @@ risk-owl:FinancialLoss a rdfs:Class, risk-owl:Fraud a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -476,15 +753,69 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . +risk-owl:GenderDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's gender identity or gender expression"@en ; + skos:prefLabel "Gender Discrimination"@en . + +risk-owl:GeographicDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's geographical origin or residence"@en ; + skos:prefLabel "Geographic Discrimination"@en . + +risk-owl:GroupAttributionBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:prefLabel "Group Attribution Bias"@en . + +risk-owl:Harassment a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Harm ; + sw:term_status "accepted"@en ; + skos:prefLabel "Harassment"@en . + risk-owl:Harm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -495,9 +826,25 @@ risk-owl:Harm a rdfs:Class, skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . +risk-owl:Homophobia a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SexualOrientationDiscrimination ; + sw:term_status "accepted"@en ; + skos:definition "Hostility or prejudice against individuals who are or are perceived to be homosexual"@en ; + skos:prefLabel "Homophobia"@en . + risk-owl:HumanErrors a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -512,7 +859,11 @@ risk-owl:HumanErrors a rdfs:Class, risk-owl:IdentityFraud a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -520,15 +871,18 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -536,15 +890,16 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -558,24 +913,91 @@ risk-owl:IllegalDataProcessing a rdfs:Class, skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . +risk-owl:ImplicitBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:prefLabel "Implicit Bias"@en . + +risk-owl:InGroupBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:prefLabel "In-Group Bias"@en . + +risk-owl:IndirectDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified"@en ; + skos:prefLabel "Indirect Discrimination"@en . + risk-owl:IndividualHealthSafety a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; skos:prefLabel "Individual Health & Safety"@en . risk-owl:IndividualRisk a rdfs:Class, - owl:Class ; + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:prefLabel "Individual Risk"@en . +risk-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:prefLabel "Informativeness Bias"@en . + risk-owl:Injury a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -583,31 +1005,41 @@ risk-owl:Injury a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Injury"@en ; skos:prefLabel "Injury"@en . risk-owl:IntegrityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:IntentionalMisuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:UserRisks ; + rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; skos:definition "Intentional Misuse"@en ; skos:prefLabel "Intentional Misuse"@en . risk-owl:InterceptCommunications a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -615,8 +1047,7 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; @@ -624,25 +1055,46 @@ risk-owl:InterceptCommunications a rdfs:Class, risk-owl:JudicialCosts a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:FinancialLoss ; sw:term_status "accepted"@en ; skos:definition "Something that involves or causes judicial costs to be paid"@en ; skos:prefLabel "Judicial Costs"@en . risk-owl:JudicialPenalty a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:FinancialLoss ; sw:term_status "accepted"@en ; skos:definition "Something that involves or causes judicial penalties to be paid"@en ; skos:prefLabel "Judicial Penalty"@en . +risk-owl:LanguageDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; + skos:prefLabel "Language Discrimination"@en . + risk-owl:LegalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -651,7 +1103,10 @@ risk-owl:LegalRisk a rdfs:Class, risk-owl:LoseCredibility a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -666,7 +1121,10 @@ risk-owl:LoseCredibility a rdfs:Class, risk-owl:LoseCustomerConfidence a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -681,7 +1139,10 @@ risk-owl:LoseCustomerConfidence a rdfs:Class, risk-owl:LoseGoodwill a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -696,7 +1157,10 @@ risk-owl:LoseGoodwill a rdfs:Class, risk-owl:LoseNegotiatingCapacity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -711,7 +1175,10 @@ risk-owl:LoseNegotiatingCapacity a rdfs:Class, risk-owl:LoseOpportunity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -726,7 +1193,10 @@ risk-owl:LoseOpportunity a rdfs:Class, risk-owl:LoseReputation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -741,7 +1211,10 @@ risk-owl:LoseReputation a rdfs:Class, risk-owl:LoseTrust a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -754,9 +1227,26 @@ risk-owl:LoseTrust a rdfs:Class, skos:definition "Something that acts as or causes Loss of Trust"@en ; skos:prefLabel "Lose of Trust"@en . +risk-owl:MaliciousActivity a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "accepted"@en ; + skos:definition "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others"@en ; + skos:prefLabel "Malicious Activity"@en . + risk-owl:MaliciousCodeAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -764,17 +1254,19 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -782,17 +1274,17 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -803,9 +1295,38 @@ risk-owl:MaterialDamage a rdfs:Class, skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk-owl:Misandry a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Dislike, contempt, or prejudice against men"@en ; + skos:prefLabel "Misandry"@en . + +risk-owl:Misogyny a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Dislike, contempt, or prejudice against women"@en ; + skos:prefLabel "Misogyny"@en . + risk-owl:Misuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -815,9 +1336,25 @@ risk-owl:Misuse a rdfs:Class, skos:definition "Something that acts as or causes Misuse"@en ; skos:prefLabel "Misuse"@en . +risk-owl:NationalityDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's nationality or citizenship"@en ; + skos:prefLabel "Nationality Discrimination"@en . + risk-owl:NonMaterialDamage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -828,30 +1365,83 @@ risk-owl:NonMaterialDamage a rdfs:Class, skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk-owl:NonNormalityBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:prefLabel "Non-Normality Bias"@en . + +risk-owl:NonResponseBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:prefLabel "Non-Response Bias"@en . + risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:prefLabel "Operational Security Risk"@en . +risk-owl:OutGroupHomogeneityBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + risk-owl:Payment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:prefLabel "Payment"@en . risk-owl:PersonalSafetyEndangerment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -866,7 +1456,11 @@ risk-owl:PersonalSafetyEndangerment a rdfs:Class, risk-owl:PhishingScam a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -874,15 +1468,17 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -890,22 +1486,28 @@ risk-owl:PhysicalAssault a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . risk-owl:PhysicalHarm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:prefLabel "Physical Harm"@en . risk-owl:Privacy a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; @@ -913,7 +1515,10 @@ risk-owl:Privacy a rdfs:Class, risk-owl:PsychologicalHarm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -921,14 +1526,16 @@ risk-owl:PsychologicalHarm a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -941,23 +1548,68 @@ risk-owl:PublicOrderBreach a rdfs:Class, skos:definition "Something that acts as or causes Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . +risk-owl:RacialDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Racism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals because of their racial background or skin color"@en ; + skos:prefLabel "Racial Discrimination"@en . + +risk-owl:Racism a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Prejudice or discrimination against people based on their race"@en ; + skos:prefLabel "Racism"@en . + risk-owl:Reidentification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . +risk-owl:ReligiousDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's religious beliefs or practices"@en ; + skos:prefLabel "Religious Discrimination"@en . + risk-owl:Renumeration a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -969,41 +1621,121 @@ risk-owl:Renumeration a rdfs:Class, risk-owl:ReputationalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:prefLabel "Reputational Risk"@en . +risk-owl:RequirementsBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + +risk-owl:ReverseDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality"@en ; + skos:prefLabel "Reverse Discrimination"@en . + risk-owl:Reward a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:prefLabel "Reward"@en . +risk-owl:RightEroded a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:prefLabel "Erosion of Rights"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightObstructed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:prefLabel "Obstruction of Rights"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightsDenial a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:prefLabel "Denial of Rights"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk-owl:RightsExercisePrevention a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; + skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; skos:prefLabel "Prevent Exercising of Rights"@en ; - skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsImpact a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1011,42 +1743,81 @@ risk-owl:RightsImpact a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Impact, - risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Impact to Rights"@en ; skos:prefLabel "Impact to Rights"@en ; - skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsLimitation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Limitation of Rights"@en ; + skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; skos:prefLabel "Limitation of Rights"@en ; - skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightsUnfulfilled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Failure to meet or complete the fulfilment of rights"@en ; + skos:prefLabel "Unfulfilment of Rights"@en ; + skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsViolation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; skos:prefLabel "Violation of Rights"@en ; - skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RuleBasedSystemDesign a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . risk-owl:Sabotage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1054,16 +1825,33 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . +risk-owl:SamplingBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:prefLabel "Sampling Bias"@en . + risk-owl:Scam a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1071,27 +1859,34 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . risk-owl:SecurityAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . risk-owl:SecurityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1099,17 +1894,82 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . +risk-owl:SelectionBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:prefLabel "Selection Bias"@en . + +risk-owl:SexDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's biological sex"@en ; + skos:prefLabel "Sex Discrimination"@en . + +risk-owl:Sexism a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping"@en ; + skos:prefLabel "Sexism"@en . + +risk-owl:SexualHarassment a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Harm ; + sw:term_status "accepted"@en ; + skos:prefLabel "Sexual Harassment"@en . + +risk-owl:SexualOrientationDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual"@en ; + skos:prefLabel "SexualOrientation Discrimination"@en . + risk-owl:SexualViolence a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1117,14 +1977,32 @@ risk-owl:SexualViolence a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . +risk-owl:SimpsonsParadoxBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1134,9 +2012,27 @@ risk-owl:SocialDisadvantage a rdfs:Class, skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . +risk-owl:SocietalBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:prefLabel "Societal Bias"@en . + risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; @@ -1144,7 +2040,10 @@ risk-owl:SocietalHealthSafety a rdfs:Class, risk-owl:SocietalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -1153,28 +2052,46 @@ risk-owl:SocietalRisk a rdfs:Class, risk-owl:Spoofing a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:prefLabel "Spoofing"@en . +risk-owl:StatisticalBias a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:prefLabel "Statistical Bias"@en . + risk-owl:SystemFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1182,8 +2099,7 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -1191,7 +2107,12 @@ risk-owl:SystemFailure a rdfs:Class, risk-owl:SystemIntrusion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1199,17 +2120,18 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1217,8 +2139,7 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -1226,7 +2147,10 @@ risk-owl:SystemMalfunction a rdfs:Class, risk-owl:Terrorism a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1239,9 +2163,28 @@ risk-owl:Terrorism a rdfs:Class, skos:definition "Something that acts as or causes Terrorism"@en ; skos:prefLabel "Terrorism"@en . +risk-owl:Transphobia a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms"@en ; + skos:prefLabel "Transphobia"@en . + risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1249,29 +2192,34 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1279,16 +2227,18 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1296,15 +2246,18 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1312,15 +2265,18 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1328,15 +2284,18 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1344,15 +2303,18 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1360,15 +2322,18 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1376,28 +2341,34 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1405,15 +2376,19 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1421,16 +2396,18 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1438,15 +2415,19 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . risk-owl:UnwantedCodeDeletion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1454,16 +2435,19 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1471,16 +2455,18 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1488,15 +2474,16 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk-owl:UserRisks a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -1505,7 +2492,9 @@ risk-owl:UserRisks a rdfs:Class, risk-owl:ViolatingCodeOfConduct a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1513,7 +2502,7 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; skos:prefLabel "Violating Code of Conduct"@en ; @@ -1521,7 +2510,9 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, risk-owl:ViolatingContractualObligation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1529,7 +2520,7 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; skos:prefLabel "Violation of Contractual Obligation"@en ; @@ -1537,7 +2528,9 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, risk-owl:ViolatingEthicsCode a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1545,7 +2538,7 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; skos:prefLabel "Violating Ethics Code"@en ; @@ -1553,7 +2546,9 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, risk-owl:ViolatingLegalObligation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1561,7 +2556,7 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; skos:prefLabel "Violation of Legal Obligations"@en ; @@ -1569,16 +2564,20 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; skos:prefLabel "Violating Policy"@en . risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1586,7 +2585,7 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; skos:prefLabel "Violation of Statutory Obligations"@en ; @@ -1594,7 +2593,10 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, risk-owl:ViolenceAgainstChildren a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1602,7 +2604,7 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Child Violence"@en ; skos:prefLabel "Violence against children"@en ; @@ -1672,6 +2674,7 @@ risk-owl: a owl:Ontology, "http://www.w3.org/2004/02/skos/core" ; dct:contributor "Axel Polleres", "Beatriz Esteves", + "Daniel Doherty", "Delaram Golpayegani", "Fajar Ekaputra", "Georg P. Krog", @@ -1690,7 +2693,7 @@ risk-owl: a owl:Ontology, dct:identifier "https://w3id.org/dpv/risk" ; dct:issued "2022-08-14"@en ; dct:license ; - dct:modified "2024-07-13"@en ; + dct:modified "2024-08-18"@en ; dct:publisher ; dct:source ; dct:title "Risk Concepts"@en ; diff --git a/2.1-dev/risk/modules/risk_taxonomy.csv b/2.1-dev/risk/modules/risk_taxonomy.csv new file mode 100644 index 000000000..d286337ea --- /dev/null +++ b/2.1-dev/risk/modules/risk_taxonomy.csv @@ -0,0 +1,162 @@ +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk +AgeDiscrimination,class,https://w3id.org/dpv/risk#AgeDiscrimination,Age Discrimination,"Discrimination based on a person's age, often impacting older or younger individuals",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Compensation,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#RiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CasteDiscrimination,class,https://w3id.org/dpv/risk#CasteDiscrimination,Caste Discrimination,"Discrimination based on a person's caste, a form of social stratification found in some cultures",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +DirectDiscrimination,class,https://w3id.org/dpv/risk#DirectDiscrimination,Direct Discrimination,"Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +DisabilityDiscrimination,class,https://w3id.org/dpv/risk#DisabilityDiscrimination,Disability Discrimination,Discrimination against individuals based on physical or mental disabilities,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DenialServiceAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EthnicDiscrimination,class,https://w3id.org/dpv/risk#EthnicDiscrimination,Ethnic Discrimination,Discrimination against individuals based on their ethnicity or cultural heritage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk +ExcellenceDiscrimination,class,https://w3id.org/dpv/risk#ExcellenceDiscrimination,Excellence Discrimination,"Favoritism towards individuals deemed more competent or superior, often at the expense of others",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +GenderDiscrimination,class,https://w3id.org/dpv/risk#GenderDiscrimination,Gender Discrimination,Discrimination based on a person's gender identity or gender expression,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +GeographicDiscrimination,class,https://w3id.org/dpv/risk#GeographicDiscrimination,Geographic Discrimination,Discrimination based on a person's geographical origin or residence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Harassment,class,https://w3id.org/dpv/risk#Harassment,Harassment,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk +Homophobia,class,https://w3id.org/dpv/risk#Homophobia,Homophobia,Hostility or prejudice against individuals who are or are perceived to be homosexual,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +IndirectDiscrimination,class,https://w3id.org/dpv/risk#IndirectDiscrimination,Indirect Discrimination,"Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,,,,,risk,https://w3id.org/dpv/risk +InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk +JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk +LanguageDiscrimination,class,https://w3id.org/dpv/risk#LanguageDiscrimination,Language Discrimination,"Discrimination based on a person's language, often linked to national origin or ethnicity",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaliciousActivity,class,https://w3id.org/dpv/risk#MaliciousActivity,Malicious Activity,"Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +Misandry,class,https://w3id.org/dpv/risk#Misandry,Misandry,"Dislike, contempt, or prejudice against men",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Misogyny,class,https://w3id.org/dpv/risk#Misogyny,Misogyny,"Dislike, contempt, or prejudice against women",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk +NationalityDiscrimination,class,https://w3id.org/dpv/risk#NationalityDiscrimination,Nationality Discrimination,Discrimination based on a person's nationality or citizenship,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RacialDiscrimination,class,https://w3id.org/dpv/risk#RacialDiscrimination,Racial Discrimination,Discrimination against individuals because of their racial background or skin color,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Racism,class,https://w3id.org/dpv/risk#Racism,Racism,Prejudice or discrimination against people based on their race,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +ReligiousDiscrimination,class,https://w3id.org/dpv/risk#ReligiousDiscrimination,Religious Discrimination,Discrimination based on a person's religious beliefs or practices,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk +ReverseDiscrimination,class,https://w3id.org/dpv/risk#ReverseDiscrimination,Reverse Discrimination,"Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +RightEroded,class,https://w3id.org/dpv/risk#RightEroded,Erosion of Rights,The gradual weakening or reduction of the scope and protection of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightObstructed,class,https://w3id.org/dpv/risk#RightObstructed,Obstruction of Rights,Interference with or blocking of the exercise of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsDenial,class,https://w3id.org/dpv/risk#RightsDenial,Denial of Rights,The refusal or withholding or denial of the existence or applicability of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Actions or measures that prevent an individual or group from exercising their legal rights.,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,A limitation or restrictions on the scope or exercise of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""LimitationOfRights"" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsUnfulfilled,class,https://w3id.org/dpv/risk#RightsUnfulfilled,Unfulfilment of Rights,Failure to meet or complete the fulfilment of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,The infringement or breach of rights in a manner that constitues a 'violation' of those rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""ViolationOfRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SexDiscrimination,class,https://w3id.org/dpv/risk#SexDiscrimination,Sex Discrimination,Discrimination based on a person's biological sex,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Sexism,class,https://w3id.org/dpv/risk#Sexism,Sexism,"Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +SexualHarassment,class,https://w3id.org/dpv/risk#SexualHarassment,Sexual Harassment,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +SexualOrientationDiscrimination,class,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,SexualOrientation Discrimination,"Discrimination based on a person's sexual orientation, typically against those who are not heterosexual",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk +SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Transphobia,class,https://w3id.org/dpv/risk#Transphobia,Transphobia,Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,,,,risk,https://w3id.org/dpv/risk +ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_consequences.jsonld b/2.1-dev/risk/modules/risk_taxonomy.jsonld similarity index 60% rename from 2.1-dev/risk/modules/risk_consequences.jsonld rename to 2.1-dev/risk/modules/risk_taxonomy.jsonld index 00f06f02e..2540f8edd 100644 --- a/2.1-dev/risk/modules/risk_consequences.jsonld +++ b/2.1-dev/risk/modules/risk_taxonomy.jsonld @@ -1,90 +1,18 @@ [ { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#LegalRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk#Transphobia", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -100,39 +28,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "Transphobia" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -153,7 +77,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" + "@id": "_:N01592d7a5ed64907a324ef43ea425e66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -164,79 +88,68 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", + "@id": "_:N01592d7a5ed64907a324ef43ea425e66", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "https://w3id.org/dpv/risk#Racism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -252,33 +165,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Prejudice or discrimination against people based on their race" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Racism" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -293,42 +209,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#Misuse" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "https://w3id.org/dpv/risk#SexualViolence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -338,7 +248,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -347,6 +257,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -360,39 +275,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" + "@value": "Sexual Violence" + } + ] + }, + { + "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -413,7 +342,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" + "@id": "_:N24492f14343b4b90bddc2673a3b6d932" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -424,40 +353,34 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", + "@id": "_:N24492f14343b4b90bddc2673a3b6d932", "@type": [ "https://schema.org/WebPage" ], @@ -473,33 +396,55 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#Harm" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" + "@language": "en", + "@value": "Physical Harm" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -513,12 +458,6 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -526,43 +465,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -583,7 +510,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" + "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -594,13 +521,10 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -608,29 +532,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" + "@value": "System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", + "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d", "@type": [ "https://schema.org/WebPage" ], @@ -646,11 +570,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -660,7 +587,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -669,11 +596,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -687,70 +609,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" - } - ] - }, - { - "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk#DataAggregationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfbea264abf694083a7d1db8b2101092b" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -766,133 +676,159 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "_:Nfbea264abf694083a7d1db8b2101092b", + "@id": "https://w3id.org/dpv/risk#CoverageBias", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Coverage Bias" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk#SecurityAttack", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#NonNormalityBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -908,33 +844,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Non-Normality Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -955,7 +895,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" + "@id": "_:N809a964650274e1ca9c544fb513732ef" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -971,76 +911,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@id": "_:N809a964650274e1ca9c544fb513732ef", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#NonResponseBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1056,52 +988,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Non-Response Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -1122,7 +1038,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc74530c53d534886a66e5a7f741398bb" + "@id": "_:Ndd18bed776ec45498b139828923f57f1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1138,52 +1054,84 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:Nc74530c53d534886a66e5a7f741398bb", + "@id": "_:Ndd18bed776ec45498b139828923f57f1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Reidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1193,7 +1141,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -1202,11 +1150,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1220,59 +1163,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" - } - ] - }, - { - "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Re-identification" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1281,6 +1217,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1294,84 +1235,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", + "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "ENISA Threat Landscape 2021" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Physical Harm" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#InGroupBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1387,42 +1312,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#Privacy", + "@id": "https://w3id.org/dpv/risk#Sexism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1437,27 +1362,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Sexism" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "https://w3id.org/dpv/risk#CasteDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1472,33 +1412,67 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Caste Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -1519,7 +1493,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" + "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1535,83 +1509,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Terrorism" } ] }, { - "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", + "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#RightsDenial", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N539160303302464aa341bdfa53068f22" - }, - { - "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1626,96 +1569,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "The refusal or withholding or denial of the existence or applicability of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N539160303302464aa341bdfa53068f22", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Denial of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7487c570f8f54358874e08fa38c8f27d" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1730,68 +1625,46 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Misuse" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N7487c570f8f54358874e08fa38c8f27d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#Discrimination", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -1813,49 +1686,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#Renumeration" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "https://w3id.org/dpv/risk#ConfirmationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1871,43 +1747,46 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -1916,11 +1795,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1934,49 +1808,93 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", + "@id": "https://w3id.org/dpv/risk#RightsUnfulfilled", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RightsImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Failure to meet or complete the fulfilment of rights" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unfulfilment of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1997,7 +1915,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na882c52257364f5896e5b38b50bb08fe" + "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2013,59 +1931,62 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:Na882c52257364f5896e5b38b50bb08fe", + "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -2074,11 +1995,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2092,49 +2008,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#Renumeration" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -2155,7 +2057,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne3511d0b904a403e93b1538888ad1023" + "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2171,35 +2073,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Violating Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:Ne3511d0b904a403e93b1538888ad1023", + "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0", "@type": [ "https://schema.org/WebPage" ], @@ -2215,11 +2117,17 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2240,7 +2148,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7b552ef83c274f84b167cc68c23676bb" + "@id": "_:N01f7495831e241abad48b454e2462d19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2256,134 +2164,105 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - }, - { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "Compromise Account" } ] }, { - "@id": "_:N7b552ef83c274f84b167cc68c23676bb", + "@id": "_:N01f7495831e241abad48b454e2462d19", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@value": "Risk Concepts - JSON-LD serialiation" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk/risk.jsonld" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Individual Health & Safety" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Reputational Risk" + "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2398,33 +2277,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", + "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -2445,7 +2342,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1f36b972c50f49fb9b474152b57cf474" + "@id": "_:N8626c0b412094a41834e4fa199b449f9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2456,43 +2353,40 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N1f36b972c50f49fb9b474152b57cf474", + "@id": "_:N8626c0b412094a41834e4fa199b449f9", "@type": [ "https://schema.org/WebPage" ], @@ -2508,52 +2402,37 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Judicial Penalty" + "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2568,33 +2447,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2609,33 +2513,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "SexualOrientation Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2656,7 +2564,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" + "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2672,62 +2580,67 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", + "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2736,6 +2649,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2744,41 +2662,107 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@language": "en", + "@value": "Something that acts as or causes Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -2799,7 +2783,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0571680fc6554da2a384a2e851d510c0" + "@id": "_:N4f1e8d9a5f314a419875e658936b3a20" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2815,32 +2799,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:N0571680fc6554da2a384a2e851d510c0", + "@id": "_:N4f1e8d9a5f314a419875e658936b3a20", "@type": [ "https://schema.org/WebPage" ], @@ -2856,11 +2837,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2881,27 +2863,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -2922,7 +2907,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" + "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2938,29 +2923,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", + "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984", "@type": [ "https://schema.org/WebPage" ], @@ -2976,11 +2961,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3001,7 +2990,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" + "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3017,29 +3006,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", + "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0", "@type": [ "https://schema.org/WebPage" ], @@ -3055,21 +3044,24 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -3078,11 +3070,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nde382e9a51c445d69476b298827b1cbe" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3096,55 +3083,87 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "_:Nde382e9a51c445d69476b298827b1cbe", + "@id": "https://w3id.org/dpv/risk#UserRisks", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with risks that arise due to User or Human use" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3165,7 +3184,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N258e312c37aa4354bed73603ef7a36f6" + "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3181,49 +3200,86 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Malware Attack" } ] }, { - "@id": "_:N258e312c37aa4354bed73603ef7a36f6", + "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3244,7 +3300,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3adf839933da482c89a2828fc9743969" + "@id": "_:N70af67194f054cbcbe4d1d616683423b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3260,75 +3316,102 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Coercion" } ] }, { - "@id": "_:N3adf839933da482c89a2828fc9743969", + "@id": "_:N70af67194f054cbcbe4d1d616683423b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "https://w3id.org/dpv/risk#Homophobia", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "DGA 2.10" + "@value": "Homophobia" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3338,59 +3421,46 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#FinancialLoss" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#GenderDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3406,49 +3476,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Discrimination based on a person's gender identity or gender expression" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" - } - ] - }, - { - "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Gender Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3469,7 +3527,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0b5dd4cc254540f49140434e86708abb" + "@id": "_:Nadd5922c22574bd38879939155a85ae3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3480,81 +3538,105 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Identity Fraud" } ] }, { - "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@id": "_:Nadd5922c22574bd38879939155a85ae3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that arise during operational processes" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Operational Security Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExcellenceDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:N698d6b9272804e2dba685b14f6e69152" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3570,49 +3652,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" - } - ] - }, - { - "@id": "_:N698d6b9272804e2dba685b14f6e69152", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Excellence Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -3633,7 +3701,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N95f46ba999c74717949420ed05a75570" + "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3649,35 +3717,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Copyright Violation" } ] }, { - "@id": "_:N95f46ba999c74717949420ed05a75570", + "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f", "@type": [ "https://schema.org/WebPage" ], @@ -3693,11 +3755,66 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#DisabilityDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against individuals based on physical or mental disabilities" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Disability Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3718,7 +3835,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N18aeaa08367a4c56822793249e34feae" + "@id": "_:N174281b4f06940a18a9e6519d98fa3e3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3734,58 +3851,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "System Intrusion" } ] }, { - "@id": "_:N18aeaa08367a4c56822793249e34feae", + "@id": "_:N174281b4f06940a18a9e6519d98fa3e3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3806,7 +3917,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" + "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3822,38 +3933,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", + "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908", "@type": [ "https://schema.org/WebPage" ], @@ -3869,43 +3971,76 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" - } + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, + "@id": "https://w3id.org/dpv/risk#FinancialImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@language": "en", + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3926,7 +4061,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N50def33314ee4442bf7e77161e51165b" + "@id": "_:Nd268380dc1f84dea9ec58ef31331c264" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3942,96 +4077,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Scam" } ] }, { - "@id": "_:N50def33314ee4442bf7e77161e51165b", + "@id": "_:Nd268380dc1f84dea9ec58ef31331c264", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Societal Risk" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4052,7 +4144,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" + "@id": "_:N45e627abb33f484ea319253eb043bcd9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4068,74 +4160,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Extorsion" } ] }, { - "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", + "@id": "_:N45e627abb33f484ea319253eb043bcd9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4150,52 +4220,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" - } - ] - }, - { - "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4216,7 +4271,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N194bc10f01ef4bdb99f12487816e6826" + "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4227,34 +4282,40 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:N194bc10f01ef4bdb99f12487816e6826", + "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac", "@type": [ "https://schema.org/WebPage" ], @@ -4270,11 +4331,20 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#NationalityDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4289,63 +4359,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Discrimination based on a person's nationality or citizenship" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Nationality Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N029a97b214024c18a899586cb3864d2a" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4361,62 +4420,46 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" - } - ] - }, - { - "@id": "_:N029a97b214024c18a899586cb3864d2a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sabotage", + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -4425,11 +4468,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -4443,77 +4481,86 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Misuse" } ] }, { - "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", + "@id": "https://w3id.org/dpv/risk#SexDiscrimination", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "Discrimination based on a person's biological sex" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N89971235b5e34930a94f46c696e0ac94" + "@language": "en", + "@value": "Sex Discrimination" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4528,52 +4575,130 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Misandry", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Dislike, contempt, or prejudice against men" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Misandry" } ] }, { - "@id": "_:N89971235b5e34930a94f46c696e0ac94", + "@id": "https://w3id.org/dpv/risk#GeographicDiscrimination", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's geographical origin or residence" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Geographic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -4594,7 +4719,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" + "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4610,29 +4735,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Human Errors" } ] }, { - "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", + "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584", "@type": [ "https://schema.org/WebPage" ], @@ -4648,11 +4773,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -4673,7 +4801,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" + "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4689,139 +4817,195 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", + "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk#RightObstructed", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/primer" + "@language": "en", + "@value": "Interference with or blocking of the exercise of rights" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Obstruction of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#ImplicitBias", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/source": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Implicit Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "_:N3984b17b1694455793b94c3ad850178d" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4836,49 +5020,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" - } - ] - }, - { - "@id": "_:N3984b17b1694455793b94c3ad850178d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -4899,7 +5069,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N53bfad5db8324151841ce01472d06f41" + "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4910,43 +5080,40 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "Violation of Contractual Obligation" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:N53bfad5db8324151841ce01472d06f41", + "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda", "@type": [ "https://schema.org/WebPage" ], @@ -4962,11 +5129,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@id": "https://w3id.org/dpv/risk#SexualHarassment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4981,106 +5151,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Sexual Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk#Bias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "ISO/IEC 24027:2021" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5095,33 +5206,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5142,7 +5257,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" + "@id": "_:N72f880006766453c8c5284ca9a8c23ae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5158,32 +5273,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", + "@id": "_:N72f880006766453c8c5284ca9a8c23ae", "@type": [ "https://schema.org/WebPage" ], @@ -5199,63 +5311,80 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk#RightEroded", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" + "@language": "en", + "@value": "The gradual weakening or reduction of the scope and protection of rights" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Erosion of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "https://w3id.org/dpv/risk#RequirementsBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N90d89ca8a8594ecabee31205aee25395" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5271,55 +5400,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:N90d89ca8a8594ecabee31205aee25395", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Requirements Bias" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -5340,7 +5456,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" + "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5356,55 +5472,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", + "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -5425,7 +5538,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc4c391b305be479eb0e623d887a478ac" + "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5441,52 +5554,59 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Nc4c391b305be479eb0e623d887a478ac", + "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5507,7 +5627,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N64ebcf10636d495599fc0fd262e44103" + "@id": "_:Nb72c07b7fa024bcf85183796d36738b4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5523,32 +5643,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Blackmail" } ] }, { - "@id": "_:N64ebcf10636d495599fc0fd262e44103", + "@id": "_:Nb72c07b7fa024bcf85183796d36738b4", "@type": [ "https://schema.org/WebPage" ], @@ -5564,11 +5681,31 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#SelectionBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5583,33 +5720,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Selection Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhishingScam", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5630,7 +5771,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" + "@id": "_:N4a6ecf056dcd484394a81241d36bbc29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5646,52 +5787,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Identity Theft" } ] }, { - "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", + "@id": "_:N4a6ecf056dcd484394a81241d36bbc29", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -5701,7 +5842,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5710,6 +5851,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5723,91 +5869,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Remuneration" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5828,7 +5936,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2ea871931e3746e4aff469f67008e44f" + "@id": "_:Neee39564ca4e493181200a260513b3de" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5844,29 +5952,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N2ea871931e3746e4aff469f67008e44f", + "@id": "_:Neee39564ca4e493181200a260513b3de", "@type": [ "https://schema.org/WebPage" ], @@ -5882,11 +5990,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5907,7 +6019,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0eacc049940646a99623da2cd6a2d394" + "@id": "_:N95204127ed924036926f89eb7e5b0678" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5923,74 +6035,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N0eacc049940646a99623da2cd6a2d394", + "@id": "_:N95204127ed924036926f89eb7e5b0678", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk#Harassment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1005943ded74408ea68c811475686000" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6005,52 +6095,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" - } - ] - }, - { - "@id": "_:N1005943ded74408ea68c811475686000", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6071,7 +6141,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" + "@id": "_:N05a9ed7355894f6bb37c02c33f9226da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6087,93 +6157,69 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", + "@id": "_:N05a9ed7355894f6bb37c02c33f9226da", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "ISO/IEC 24027:2021" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UserRisks", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6188,33 +6234,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Group Attribution Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -6235,7 +6284,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" + "@id": "_:N625f03306b04496198a17a1c1fc9f2cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6246,40 +6295,34 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Financial Loss" } ] }, { - "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", + "@id": "_:N625f03306b04496198a17a1c1fc9f2cc", "@type": [ "https://schema.org/WebPage" ], @@ -6295,42 +6338,81 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk#ReligiousDiscrimination", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - N3 serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Discrimination based on a person's religious beliefs or practices" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Religious Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6345,42 +6427,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk#LegalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6395,42 +6470,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6451,7 +6521,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" + "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6467,52 +6537,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", + "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6533,7 +6604,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" + "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6549,38 +6620,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", + "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26", "@type": [ "https://schema.org/WebPage" ], @@ -6596,11 +6658,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6621,7 +6687,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" + "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6637,58 +6703,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", + "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -6709,7 +6769,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb75b090fdcda4ec38e841680681bf642" + "@id": "_:N60882207c25442eab9509dc96896d91a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6725,77 +6785,103 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:Nb75b090fdcda4ec38e841680681bf642", + "@id": "_:N60882207c25442eab9509dc96896d91a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#ComponentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "_:Nb240be91051241df8fe71581eedea8cc" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6805,60 +6891,140 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialLoss" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" + "@value": "Judicial Costs" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MaliciousActivity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Malicious Activity" } ] }, { - "@id": "_:Nb240be91051241df8fe71581eedea8cc", + "@id": "https://w3id.org/dpv/risk#IndividualRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6873,33 +7039,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6920,7 +7090,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na783f8da28594e8794173492db9ecac9" + "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6936,49 +7106,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:Na783f8da28594e8794173492db9ecac9", + "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6999,7 +7173,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N33b7660d50a4461e927089957dfd848b" + "@id": "_:N9d18ac853d6249008536496d60a088cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7014,9 +7188,6 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -7024,249 +7195,2626 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N33b7660d50a4461e927089957dfd848b", + "@id": "_:N9d18ac853d6249008536496d60a088cd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "http://purl.org/dc/terms/format": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Julian Flake" - }, + "http://purl.org/dc/terms/title": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised System Access" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised System Access" + } + ] + }, + { + "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Benefit", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Compensation" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes benefits" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Benefit" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6177ab61947545c3b0f993f924c70c28" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Child Violence" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N6177ab61947545c3b0f993f924c70c28", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Access to Premises" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Access to Premises" + } + ] + }, + { + "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N366da704654a4b4682d8de807d0f1bef" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Code Access" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Code Access" + } + ] + }, + { + "@id": "_:N366da704654a4b4682d8de807d0f1bef", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DirectDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Direct Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Simpson'S Paradox Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Fraud", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4cecb70bedcf46ce9f21038688293a9e" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Fraud" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Fraud" + } + ] + }, + { + "@id": "_:N4cecb70bedcf46ce9f21038688293a9e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "modified" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Violation of Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N58c7a823728a4bbc929c09b50030b836" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Loss of Trust" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Lose of Trust" + } + ] + }, + { + "@id": "_:N58c7a823728a4bbc929c09b50030b836", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RacialDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Racism" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against individuals because of their racial background or skin color" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Racial Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk", + "@type": [ + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/creator": [ + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N91553afacd2e4fc881b533ca4457b82b" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Physical Assault" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Assault" + } + ] + }, + { + "@id": "_:N91553afacd2e4fc881b533ca4457b82b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Re-Identification" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Re-Identification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when humans are processing and interpreting information" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Cognitive Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AgeDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's age, often impacting older or younger individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Age Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Confounding Variables Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N636eafbaa808469aa226aaa74ca74855" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "modified" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Interception of Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N636eafbaa808469aa226aaa74ca74855", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Misogyny", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Sexism" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Dislike, contempt, or prejudice against women" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Misogyny" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Reward", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Renumeration" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reward" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Harm", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Harm to humans" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#EthnicDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Racism" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Ethnic Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb81ef67053e949d7a297791513c8eab8" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Authorisation Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Authorisation Failure" + } + ] + }, + { + "@id": "_:Nb81ef67053e949d7a297791513c8eab8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISa Trust Services Security Incidents 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Discrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Discrimination" + }, + { + "@language": "en", + "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SocietalBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SamplingBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SelectionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when data records are not collected randomly from the intended population" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Sampling Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SecurityBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Data Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Breach" + } + ] + }, + { + "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Georg P. Krog" - }, + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Paul Ryan" - }, + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Rob Brennan" - }, + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LanguageDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Beatriz Esteves" - }, + "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Julian Flake" + "@value": "Language Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "accepted" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-07-13" + "@value": "Denial of Service Attack (DoS)" } + ] + }, + { + "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57", + "@type": [ + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/publisher": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Risk Concepts" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/examples" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "risk" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "RISK" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@id": "_:Nc32ca360a68540de9b7d635beec8d66a" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "2.1-dev" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/primer" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/guides" - }, + "@id": "https://w3id.org/dpv/risk#SecurityAttack" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/examples" - }, + "@language": "en", + "@value": "Something that acts as or causes Malicious Code Attack" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, + "@language": "en", + "@value": "Malicious Code Attack" + } + ] + }, + { + "@id": "_:Nc32ca360a68540de9b7d635beec8d66a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReverseDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv" + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Reverse Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -7287,7 +9835,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0ddf524630684b719d7f03f907c20cff" + "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7303,65 +9851,112 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N0ddf524630684b719d7f03f907c20cff", + "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InformativenessBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7377,43 +9972,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Informativeness Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7422,6 +10022,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd6abb4f630e44551bf502809758f49c1" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7435,33 +10040,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Sabotage" } ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "_:Nd6abb4f630e44551bf502809758f49c1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -7471,7 +10095,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -7493,33 +10117,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "A limitation or restrictions on the scope or exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6ec056b8005a44a48b4e0542b09105e6" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7537,40 +10192,71 @@ "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Impact to Rights" + } + ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Health & Safety" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "_:N6ec056b8005a44a48b4e0542b09105e6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DataProcessingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7586,39 +10272,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7639,7 +10323,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N72e00e4999f548eb88bf909311860524" + "@id": "_:N8a73cba67e0045688727d0972f8b70f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7654,9 +10338,6 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -7664,43 +10345,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:N72e00e4999f548eb88bf909311860524", + "@id": "_:N8a73cba67e0045688727d0972f8b70f6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7721,7 +10408,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" + "@id": "_:Nedb073eb260845019e04df25c90d654e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7737,29 +10424,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Security Breach" } ] }, { - "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", + "@id": "_:Nedb073eb260845019e04df25c90d654e", "@type": [ "https://schema.org/WebPage" ], @@ -7806,11 +10493,16 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7820,7 +10512,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7829,6 +10521,71 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne12951e4dd044f82839888833ef1ed00" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unwanted Data Deletion" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unwanted Data Deletion" + } + ] + }, + { + "@id": "_:Ne12951e4dd044f82839888833ef1ed00", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7842,39 +10599,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7895,7 +10651,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" + "@id": "_:N6eb433c5024843b085be0656a9fc2cbb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7911,38 +10667,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Spoofing" } ] }, { - "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", + "@id": "_:N6eb433c5024843b085be0656a9fc2cbb", "@type": [ "https://schema.org/WebPage" ], @@ -7958,11 +10705,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7983,7 +10734,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" + "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7999,32 +10750,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", + "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03", "@type": [ "https://schema.org/WebPage" ], @@ -8040,41 +10794,81 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/risk#IndirectDiscrimination", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - HTML serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Indirect Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@id": "https://w3id.org/dpv/risk#StatisticalBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 20501:2019" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8087,40 +10881,47 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "Statistical Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -8142,39 +10943,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -8195,15 +10992,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples#E0071" + "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8219,38 +11008,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Public Order Breach" } ] }, { - "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", + "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01", "@type": [ "https://schema.org/WebPage" ], @@ -8266,11 +11046,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -8291,7 +11074,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" + "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8307,79 +11090,129 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Injury" } ] }, { - "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", + "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#DataBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N8705162a41ca472c9e3867ec5902de25" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8395,43 +11228,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "_:N8705162a41ca472c9e3867ec5902de25", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" } ] } diff --git a/2.1-dev/risk/modules/risk_consequences.n3 b/2.1-dev/risk/modules/risk_taxonomy.n3 similarity index 52% rename from 2.1-dev/risk/modules/risk_consequences.n3 rename to 2.1-dev/risk/modules/risk_taxonomy.n3 index 87558834f..d0e401bcc 100644 --- a/2.1-dev/risk/modules/risk_consequences.n3 +++ b/2.1-dev/risk/modules/risk_taxonomy.n3 @@ -17,17 +17,38 @@ risk:AccidentalMisuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:UserRisks ; + skos:broader risk:Misuse ; skos:definition "Accidental Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Accidental Misuse"@en . +risk:AgeDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's age, often impacting older or younger individuals"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Age Discrimination"@en . + risk:AuthorisationFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -36,38 +57,62 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Authorisation Failure"@en . risk:AvailabilityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:DataBreach ; - skos:inScheme risk:risk-consequences-classes . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-taxonomy-classes . risk:Benefit a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Compensation ; skos:definition "Something that acts as or causes benefits"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Benefit"@en . +risk:Bias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RiskConcept ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Bias"@en . + risk:Blackmail a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -76,15 +121,18 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Blackmail"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Blackmail"@en . risk:BruteForceAuthorisations a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -93,16 +141,32 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Brute Force Authorisations"@en . +risk:CasteDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's caste, a form of social stratification found in some cultures"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Caste Discrimination"@en . + risk:Coercion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -111,52 +175,82 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Coercion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coercion"@en . +risk:CognitiveBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Cognitive Bias"@en . + risk:Compensation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compensation"@en . risk:ComponentFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . risk:ComponentMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . risk:CompromiseAccount a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -165,17 +259,18 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account"@en . risk:CompromiseAccountCredentials a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -184,15 +279,18 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account Credentials"@en . risk:ConfidentialityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -201,15 +299,48 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:DataBreach ; + skos:broader risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confidentiality Breach"@en . +risk:ConfirmationBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Confirmation Bias"@en . + +risk:ConfoundingVariablesBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Confounding Variables Bias"@en . + risk:CopyrightViolation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -218,14 +349,33 @@ risk:CopyrightViolation a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Copyright Violation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Copyright Violation"@en . +risk:CoverageBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Coverage Bias"@en . + risk:Cryptojacking a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -234,15 +384,17 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Cryptojacking"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cryptojacking"@en . risk:Damage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -250,12 +402,50 @@ risk:Damage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Damage"@en . +risk:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk:DataBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Data Bias"@en . + risk:DataBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -266,17 +456,18 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:SecurityBreach ; + skos:broader risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Breach"@en . risk:DataCorruption a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -285,16 +476,34 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . +risk:DataProcessingBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Data Processing Bias"@en . + risk:DenialServiceAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -303,15 +512,16 @@ risk:DenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk:Detriment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -319,25 +529,63 @@ risk:Detriment a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Detriment"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Detriment"@en . +risk:DirectDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Direct Discrimination"@en . + +risk:DisabilityDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination against individuals based on physical or mental disabilities"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Disability Discrimination"@en . + risk:Discrimination a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dct:created "2022-08-19"^^xsd:date, + "2024-09-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Discrimination"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RiskConcept, + risk:SocietalRisk ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, + "Something that acts as or causes Discrimination"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Discrimination"@en . risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -346,25 +594,31 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:DenialServiceAttack ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . risk:EnvironmentalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Environmental Risk"@en . risk:EquipmentFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -373,16 +627,19 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . risk:EquipmentMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -391,16 +648,18 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . risk:ErroneousSystemUse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -411,12 +670,43 @@ risk:ErroneousSystemUse a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Erroneous System Use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Erroneous System Use"@en . +risk:EthnicDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Racism ; + skos:definition "Discrimination against individuals based on their ethnicity or cultural heritage"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Ethnic Discrimination"@en . + +risk:ExcellenceDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Favoritism towards individuals deemed more competent or superior, often at the expense of others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Excellence Discrimination"@en . + risk:ExposureToHarmfulSpeech a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -427,23 +717,28 @@ risk:ExposureToHarmfulSpeech a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Harmful Speech"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . risk:ExternalSecurityThreat a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "External Security Threat"@en . risk:Extorsion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -452,39 +747,30 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Extorsion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Extorsion"@en . -risk:Fee a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source "DGA 2.10"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "modified"@en ; - skos:broader risk:FinancialImpact ; - skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Fee"@en . - risk:FinancialImpact a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Impact"@en . risk:FinancialLoss a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -495,12 +781,16 @@ risk:FinancialLoss a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Loss"@en . risk:Fraud a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -509,15 +799,73 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Fraud"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Fraud"@en . +risk:GenderDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Discrimination based on a person's gender identity or gender expression"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Gender Discrimination"@en . + +risk:GeographicDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's geographical origin or residence"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Geographic Discrimination"@en . + +risk:GroupAttributionBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Group Attribution Bias"@en . + +risk:Harassment a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Harassment"@en . + risk:Harm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -525,13 +873,30 @@ risk:Harm a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; skos:definition "Something that acts as or causes Harm to humans"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . +risk:Homophobia a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SexualOrientationDiscrimination ; + skos:definition "Hostility or prejudice against individuals who are or are perceived to be homosexual"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Homophobia"@en . + risk:HumanErrors a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -542,12 +907,16 @@ risk:HumanErrors a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Human Errors"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Human Errors"@en . risk:IdentityFraud a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -556,15 +925,18 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Identity Fraud"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Fraud"@en . risk:IdentityTheft a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -573,15 +945,16 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Identity Theft"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Theft"@en . risk:IllegalDataProcessing a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -592,30 +965,101 @@ risk:IllegalDataProcessing a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . +risk:ImplicitBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Implicit Bias"@en . + +risk:InGroupBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "In-Group Bias"@en . + +risk:IndirectDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Indirect Discrimination"@en . + risk:IndividualHealthSafety a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Health & Safety"@en . risk:IndividualRisk a rdfs:Class, - skos:Concept ; + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Risk"@en . +risk:InformativenessBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:EngineeringDecisionBias ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Informativeness Bias"@en . + risk:Injury a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -624,33 +1068,43 @@ risk:Injury a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Injury"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Injury"@en . risk:IntegrityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach, - risk:IntegrityConcept ; - skos:inScheme risk:risk-consequences-classes . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-taxonomy-classes . risk:IntentionalMisuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:UserRisks ; + skos:broader risk:Misuse ; skos:definition "Intentional Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intentional Misuse"@en . risk:InterceptCommunications a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -659,46 +1113,70 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Interception of Communications"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . risk:JudicialCosts a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:FinancialLoss ; skos:definition "Something that involves or causes judicial costs to be paid"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Judicial Costs"@en . risk:JudicialPenalty a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:FinancialLoss ; skos:definition "Something that involves or causes judicial penalties to be paid"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Judicial Penalty"@en . +risk:LanguageDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Language Discrimination"@en . + risk:LegalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Legal Risk"@en . risk:LoseCredibility a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -709,12 +1187,15 @@ risk:LoseCredibility a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Credibility"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Credibility"@en . risk:LoseCustomerConfidence a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -725,12 +1206,15 @@ risk:LoseCustomerConfidence a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Customer Confidence"@en . risk:LoseGoodwill a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -741,12 +1225,15 @@ risk:LoseGoodwill a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Goodwill"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Goodwill"@en . risk:LoseNegotiatingCapacity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -757,12 +1244,15 @@ risk:LoseNegotiatingCapacity a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Negotiating Capacity"@en . risk:LoseOpportunity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -773,12 +1263,15 @@ risk:LoseOpportunity a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Opportunity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Opportunity"@en . risk:LoseReputation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -789,12 +1282,15 @@ risk:LoseReputation a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Reputation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Reputation"@en . risk:LoseTrust a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -805,12 +1301,30 @@ risk:LoseTrust a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Trust"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Trust"@en . +risk:MaliciousActivity a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Malicious Activity"@en . + risk:MaliciousCodeAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -819,17 +1333,19 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malicious Code Attack"@en . risk:MalwareAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -838,17 +1354,17 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Malware Attack"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malware Attack"@en . risk:MaterialDamage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -856,13 +1372,44 @@ risk:MaterialDamage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Material Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk:Misandry a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Dislike, contempt, or prejudice against men"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Misandry"@en . + +risk:Misogyny a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Dislike, contempt, or prejudice against women"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Misogyny"@en . + risk:Misuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -870,12 +1417,29 @@ risk:Misuse a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Misuse"@en . +risk:NationalityDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's nationality or citizenship"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Nationality Discrimination"@en . + risk:NonMaterialDamage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -883,36 +1447,92 @@ risk:NonMaterialDamage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Non-Material Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk:NonNormalityBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Non-Normality Bias"@en . + +risk:NonResponseBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Non-Response Bias"@en . + risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that arise during operational processes"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Operational Security Risk"@en . +risk:OutGroupHomogeneityBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + risk:Payment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Payment"@en . risk:PersonalSafetyEndangerment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -923,12 +1543,16 @@ risk:PersonalSafetyEndangerment a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Personal Safety Endangerment"@en . risk:PhishingScam a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -937,15 +1561,17 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Phishing Scam"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Phishing Scam"@en . risk:PhysicalAssault a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -954,32 +1580,41 @@ risk:PhysicalAssault a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Physical Assault"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Assault"@en . risk:PhysicalHarm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Harm"@en . risk:Privacy a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Privacy"@en . risk:PsychologicalHarm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -988,14 +1623,16 @@ risk:PsychologicalHarm a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Psychological Harm"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Psychological Harm"@en . risk:PublicOrderBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1006,27 +1643,75 @@ risk:PublicOrderBreach a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Public Order Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Public Order Breach"@en . +risk:RacialDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Racism ; + skos:definition "Discrimination against individuals because of their racial background or skin color"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Racial Discrimination"@en . + +risk:Racism a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Prejudice or discrimination against people based on their race"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Racism"@en . + risk:Reidentification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . +risk:ReligiousDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's religious beliefs or practices"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Religious Discrimination"@en . + risk:Renumeration a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1034,49 +1719,134 @@ risk:Renumeration a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Remuneration"@en . risk:ReputationalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reputational Risk"@en . +risk:RequirementsBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + +risk:ReverseDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Reverse Discrimination"@en . + risk:Reward a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reward"@en . +risk:RightEroded a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Erosion of Rights"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightObstructed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Obstruction of Rights"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightsDenial a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Denial of Rights"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk:RightsExercisePrevention a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Prevent Exercising of Rights"@en ; - skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsImpact a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1085,44 +1855,85 @@ risk:RightsImpact a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Impact, - risk:SocietalRisk ; + skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Impact to Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Impact to Rights"@en ; - skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsLimitation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Limitation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Limitation of Rights"@en ; - skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightsUnfulfilled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Failure to meet or complete the fulfilment of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Unfulfilment of Rights"@en ; + skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsViolation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Violation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Rights"@en ; - skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RuleBasedSystemDesign a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . risk:Sabotage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1131,16 +1942,34 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Sabotage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sabotage"@en . +risk:SamplingBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sampling Bias"@en . + risk:Scam a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1149,28 +1978,35 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Scam"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Scam"@en . risk:SecurityAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Attack"@en . risk:SecurityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1179,17 +2015,87 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Breach"@en . +risk:SelectionBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Selection Bias"@en . + +risk:SexDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Discrimination based on a person's biological sex"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sex Discrimination"@en . + +risk:Sexism a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sexism"@en . + +risk:SexualHarassment a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sexual Harassment"@en . + +risk:SexualOrientationDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "SexualOrientation Discrimination"@en . + risk:SexualViolence a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1198,14 +2104,33 @@ risk:SexualViolence a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Sexual Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sexual Violence"@en . +risk:SimpsonsParadoxBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + risk:SocialDisadvantage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1213,53 +2138,94 @@ risk:SocialDisadvantage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Social Disadvantage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Social Disadvantage"@en . +risk:SocietalBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Societal Bias"@en . + risk:SocietalHealthSafety a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Health & Safety"@en . risk:SocietalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Risk"@en . risk:Spoofing a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Spoofing"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Spoofing"@en . +risk:StatisticalBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Statistical Bias"@en . + risk:SystemFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1268,16 +2234,20 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:SystemIntrusion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1286,17 +2256,18 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes System Intrusion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Intrusion"@en . risk:SystemMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1305,16 +2276,18 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:Terrorism a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1325,12 +2298,32 @@ risk:Terrorism a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Terrorism"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Terrorism"@en . +risk:Transphobia a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Transphobia"@en . + risk:UnauthorisedAccesstoPremises a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1339,30 +2332,35 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . risk:UnauthorisedActivity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Activity"@en . risk:UnauthorisedCodeAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1371,16 +2369,18 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Access"@en . risk:UnauthorisedCodeDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1389,15 +2389,18 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk:UnauthorisedCodeModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1406,15 +2409,18 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Modification"@en . risk:UnauthorisedDataAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1423,15 +2429,18 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Access"@en . risk:UnauthorisedDataDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1440,15 +2449,18 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk:UnauthorisedDataModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1457,15 +2469,18 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Modification"@en . risk:UnauthorisedInformationDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1474,29 +2489,35 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk:UnauthorisedReidentification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . risk:UnauthorisedResourceUse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1505,15 +2526,19 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Resource Use"@en . risk:UnauthorisedSystemAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1522,16 +2547,18 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Access"@en . risk:UnauthorisedSystemModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1540,15 +2567,19 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Modification"@en . risk:UnwantedCodeDeletion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1557,16 +2588,19 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Code Deletion"@en . risk:UnwantedDataDeletion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1575,16 +2609,18 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Data Deletion"@en . risk:UnwantedDisclosureData a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1593,25 +2629,28 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk:UserRisks a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "User Risks"@en . risk:ViolatingCodeOfConduct a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1620,15 +2659,17 @@ risk:ViolatingCodeOfConduct a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . risk:ViolatingContractualObligation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1637,15 +2678,17 @@ risk:ViolatingContractualObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk:ViolatingEthicsCode a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1654,15 +2697,17 @@ risk:ViolatingEthicsCode a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . risk:ViolatingLegalObligation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1671,25 +2716,29 @@ risk:ViolatingLegalObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Legal Obligations"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . risk:ViolatingPolicy a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Policy"@en . risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1698,15 +2747,18 @@ risk:ViolatingStatutoryObligations a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk:ViolenceAgainstChildren a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1715,9 +2767,9 @@ risk:ViolenceAgainstChildren a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Child Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . @@ -1728,6 +2780,7 @@ risk:ViolenceAgainstChildren a rdfs:Class, "http://www.w3.org/2004/02/skos/core" ; dct:contributor "Axel Polleres", "Beatriz Esteves", + "Daniel Doherty", "Delaram Golpayegani", "Fajar Ekaputra", "Georg P. Krog", @@ -1745,7 +2798,7 @@ risk:ViolenceAgainstChildren a rdfs:Class, dct:identifier "https://w3id.org/dpv/risk" ; dct:issued "2022-08-14"@en ; dct:license ; - dct:modified "2024-07-13"@en ; + dct:modified "2024-08-18"@en ; dct:publisher ; dct:source ; dct:title "Risk Concepts"@en ; @@ -1826,5 +2879,5 @@ risk:serialisation-ttl a profile:ResourceDescriptor ; profile:hasArtifact ; profile:hasRole role:guidance . -risk:risk-consequences-classes a skos:ConceptScheme . +risk:risk-taxonomy-classes a skos:ConceptScheme . diff --git a/2.1-dev/risk/modules/risk_consequences.rdf b/2.1-dev/risk/modules/risk_taxonomy.rdf similarity index 54% rename from 2.1-dev/risk/modules/risk_consequences.rdf rename to 2.1-dev/risk/modules/risk_taxonomy.rdf index 0e164a9c5..6bb16e09d 100644 --- a/2.1-dev/risk/modules/risk_consequences.rdf +++ b/2.1-dev/risk/modules/risk_taxonomy.rdf @@ -12,462 +12,634 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - Judicial Costs - Something that involves or causes judicial costs to be paid - + + + + + Unauthorised Resource Use + Something that acts as or causes Unauthorised Resource Use + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Blackmail - Something that acts as or causes Blackmail - - - + + + + + + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations - - This concept was called "ViolationContractualObligations" in DPV 2.0 - + + + + + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - + - Fee - Something that acts as or provides fees e.g. for using a service - - DGA 2.10 - 2024-04-14 + + + + Cryptojacking + Something that acts as or causes Cryptojacking + + + 2022-08-17 2024-08-16 - modified - Georg P. Krog, Harshvardhan J. Pandit + accepted + Harshvardhan J. Pandit - + - + + + + + + + + Religious Discrimination + Discrimination based on a person's religious beliefs or practices + + 2024-09-30 + accepted + + + + - Component Malfunction - Something that acts as or causes Component Malfunction - - - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + + + + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + accepted - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + + Reverse Discrimination + Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + + 2024-09-30 + accepted + + - + - Identity Fraud - Something that acts as or causes Identity Fraud - - - + + + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - + - Cryptojacking - Something that acts as or causes Cryptojacking - - - - 2022-08-17 - 2024-08-16 + + + + Societal Health & Safety + accepted - Harshvardhan J. Pandit - + - + - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - - + + + + + Unwanted Disclosure of Data + Something that acts as or causes Unwanted Disclosure of Data + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Re-identification - Something that acts as or causes Re-identification - - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 + + + + + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises - - - - - - 2022-08-17 - 2024-08-16 + + + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + accepted - Harshvardhan J. Pandit - + - + + + + + + + + Racism + Prejudice or discrimination against people based on their race + + 2024-09-30 + accepted + + + + - Data Corruption - Something that acts as or causes Corruption of Data - - - This concept was called "Corruption Data" in DPV 2.0 - + + + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - + - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - + + + + + + + Unauthorised Activity + Something that acts as or causes Unauthorised Activity - - 2022-08-17 - 2024-08-16 accepted - Harshvardhan J. Pandit - + - + - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - + + + + + Component Failure + Something that acts as or causes Component Failure - Here equipment refers to physical equipment - - 2022-08-17 - 2024-08-16 + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + + + + + + + + + + In-Group Bias + Bias that occurs when showing partiality to one's own group or own characteristics + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + Risk Concepts - N3 serialiation + + + + + + + + + Non-Response Bias + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + Financial Impact Things that cause or have the potential to impact financial resources accepted - + - + - Damage - Something that acts as or causes Damage - - 2022-03-30 - 2024-08-16 + + + + Intentional Misuse + Intentional Misuse + accepted - Harshvardhan J. Pandit - + - + - Discrimination - Something that acts as or causes Discrimination - + + + + + Re-identification + Something that acts as or causes Re-identification + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification 2022-08-19 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - + - Operational Security Risk - Risks and issues that arise during operational processes - + + + + Malicious Activity + Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + accepted - + - + - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification - - - - 2022-08-17 - 2024-08-16 + + + + Unfulfilment of Rights + Failure to meet or complete the fulfilment of rights + + Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + + + + + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - - 2022-08-17 - 2024-08-16 + + + + + Informativeness Bias + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - System Failure - Something that acts as or causes System Failure - - - Here system refers to both hardware and software systems - + + + + Lose of Credibility + Something that acts as or causes Loss of Credibility + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Privacy + + + + Individual Health & Safety accepted - + - + - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - - - - - 2022-08-17 + + + + Harm + Something that acts as or causes Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Sabotage - Something that acts as or causes Sabotage - - - - + + + + + Extorsion + Something that acts as or causes Extorsion + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - - + + + + + + + Security Breach + Something that acts as or causes Security Breach + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - + + + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - System Intrusion - Something that acts as or causes System Intrusion - - - - - + + + + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + + Limitation of Rights + A limitation or restrictions on the scope or exercise of rights + + This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + - + - Unwanted Disclosure of Data - Something that acts as or causes Unwanted Disclosure of Data - - - + + + + Physical Assault + Something that acts as or causes Physical Assault + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + + + + + Out-Group Homogeneity Bias + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - Misuse - Something that acts as or causes Misuse - - 2024-06-11 + + + + + Identity Fraud + Something that acts as or causes Identity Fraud + + + 2022-08-17 2024-08-16 accepted - Delaram Golpayegani + Harshvardhan J. Pandit - + @@ -480,7 +652,7 @@ Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management 2022-08-14 2022-08-14 - 2024-07-13 + 2024-08-18 Harshvardhan J. Pandit Georg P. Krog Paul Ryan @@ -498,12 +670,13 @@ Delaram Golpayegani - Fajar Ekaputra - Axel Polleres + Harshvardhan J. Pandit Beatriz Esteves Georg P. Krog + Axel Polleres + Fajar Ekaputra Julian Flake - Harshvardhan J. Pandit + Daniel Doherty risk https://w3id.org/dpv/risk# @@ -519,956 +692,1896 @@ - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 + + + + Impact to Rights + Something that acts as or causes Impact to Rights + + This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + 2022-08-17 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Harshvardhan J. Pandit - + - + - Intercept Communications - Something that acts as or causes Interception of Communications - - - This concept was called "InterceptionCommunications" in DPV 2.0 - - 2022-08-17 + + + + Misuse + Something that acts as or causes Misuse + + 2024-06-11 2024-08-16 - modified - Harshvardhan J. Pandit + accepted + Delaram Golpayegani - + - + - - Lose of Opportunity - Something that acts as or causes Loss of Opportunity - - - 2022-08-17 - 2024-08-16 + + + + + Sexism + Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - - + + + + + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 + + + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - + - Data Breach - Something that acts as or causes Data Breach - - - - - + + + + Lose of Reputation + Something that acts as or causes Loss of Reputation + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Extorsion - Something that acts as or causes Extorsion - - - - 2022-08-17 - 2024-08-16 + + + + + Age Discrimination + Discrimination based on a person's age, often impacting older or younger individuals + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - + + + + + + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - - Intentional Misuse - Intentional Misuse - - accepted - - + - + - Lose of Trust - Something that acts as or causes Loss of Trust - - + + + + Terrorism + Something that acts as or causes Terrorism + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - - 2022-08-17 + + + + Prevent Exercising of Rights + Actions or measures that prevent an individual or group from exercising their legal rights. + + This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 2024-08-16 - modified - Harshvardhan J. Pandit + accepted + Georg P. Krog, Harshvardhan J. Pandit - + - + - - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure - - - - 2022-08-17 - 2024-08-16 + + + + + Simpson'S Paradox Bias + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - - - - 2022-08-17 - 2024-08-16 + + + + + Geographic Discrimination + Discrimination based on a person's geographical origin or residence + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Detriment - Something that acts as or causes Detriment - - 2022-03-23 - 2024-08-16 + + + + + Rule-Based System Design + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + + Rule based system design also potentially introduces various forms of human cognitive bias + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Psychological Harm - Something that acts as or causes Psychological Harm - - + + + + + Coercion + Something that acts as or causes Coercion + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - - - 2022-08-17 - 2024-08-16 + + + Operational Security Risk + Risks and issues that arise during operational processes + accepted - Harshvardhan J. Pandit - + - + - Injury - Something that acts as or causes Injury - - + + + + + Intercept Communications + Something that acts as or causes Interception of Communications + + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - + - Copyright Violation - Something that acts as or causes Copyright Violation - - - 2022-08-17 - 2024-08-16 + + + + + Component Malfunction + Something that acts as or causes Component Malfunction + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + Risk Concepts - HTML serialiation - + - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification - - - + + + + + + Malware Attack + Something that acts as or causes Malware Attack + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Lose of Reputation - Something that acts as or causes Loss of Reputation - - - 2022-08-17 + + + + Damage + Something that acts as or causes Damage + + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - - + + + + + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Fraud - Something that acts as or causes Fraud - - - + + + + + + System Intrusion + Something that acts as or causes System Intrusion + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion - - - - - 2022-08-17 - 2024-08-16 + + + + + Bias + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Non-Material Damage - Something that acts as or causes Non-Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + + + + Erosion of Rights + The gradual weakening or reduction of the scope and protection of rights + + Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Harshvardhan J. Pandit - + - + - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser - - - - - + + + + + + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - - - 2022-08-17 - 2024-08-16 + + + + + Non-Normality Bias + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Public Order Breach - Something that acts as or causes Public Order Breach - - + + + + Human Errors + Something that acts as or causes Human Errors + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + + Confounding Variables Bias + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - + + + + + + + + Nationality Discrimination + Discrimination based on a person's nationality or citizenship + + 2024-09-30 + accepted + + + + - Malicious Code Attack - Something that acts as or causes Malicious Code Attack - - - - - + + + + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Reputational Risk - Risks and issues that affect the reputation of the organisation - + + + + Psychological Harm + Something that acts as or causes Psychological Harm + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - - - - + + + + + Confidentiality Breach + Something that acts as or causes Confidentiality Breach + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - External Security Threat - Concepts associated with security threats that are likely to originate externally - + + + + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + Risk Concepts - Turtle serialiation - + - - Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion - - - - - 2022-08-17 - 2024-08-16 + + + + + Data Bias + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + - Lose of Credibility - Something that acts as or causes Loss of Credibility + + + + Lose of Goodwill + Something that acts as or causes Loss of Goodwill - + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Coercion - Something that acts as or causes Coercion - - - - 2022-08-17 - 2024-08-16 + + + + + Caste Discrimination + Discrimination based on a person's caste, a form of social stratification found in some cultures + + 2024-09-30 accepted - Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - + + + + + Identity Theft + Something that acts as or causes Identity Theft + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Component Failure - Something that acts as or causes Component Failure - - - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + + + + Statistical Bias + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + + ISO 20501:2019 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - + + + + + + Sabotage + Something that acts as or causes Sabotage + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Erroneous System Use - Something that acts as or causes Erroneous System Use - - + + + + + + + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - System Malfunction - Something that acts as or causes System Malfunction - - - Here system refers to both hardware and software systems - - 2022-08-17 - 2024-08-16 + + + + + Homophobia + Hostility or prejudice against individuals who are or are perceived to be homosexual + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Phishing Scam - Something that acts as or causes Phishing Scam - - - + + + Public Order Breach + Something that acts as or causes Public Order Breach + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - - This concept was called "IllegalProcessingData" in DPV 2.0 - + + + User Risks + Concepts associated with risks that arise due to User or Human use + + accepted + + + + + + + + + + + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + + + + Blackmail + Something that acts as or causes Blackmail + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Misandry + Dislike, contempt, or prejudice against men + + 2024-09-30 + accepted + + + + + + + + Examples for Data Privacy Vocabulary + + + + + + + + + + + + + + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + + + + + + + Discrimination + Something that acts as or causes Discrimination + Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + + + 2022-08-19 + 2024-09-30 + 2024-08-16 + accepted + Georg P. Krog + + + + + + + + + + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals + accepted + + + + + + + + + + + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 + 2024-08-16 + accepted + Georg P. Krog + + + + + + + + + + + Judicial Costs + Something that involves or causes judicial costs to be paid + + accepted + + + + + + + + + + + Excellence Discrimination + Favoritism towards individuals deemed more competent or superior, often at the expense of others + + 2024-09-30 + accepted + + + + + + + + + + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit + + + + + + + + + + + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + + accepted + + + + + + + + + + + Sexual Harassment + + accepted + + + + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + + Lose of Customer Confidence Something that acts as or causes Loss of Customer Confidence - + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - + + + + + Fraud + Something that acts as or causes Fraud + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - + - Societal Health & Safety - + + + + + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Judicial Penalty - Something that involves or causes judicial penalties to be paid - + + + + Erroneous System Use + Something that acts as or causes Erroneous System Use + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access - - - - + + + + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + + + + + + + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + External Security Threat + Concepts associated with security threats that are likely to originate externally + + accepted + + + + + + + + + + + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + + + + Misogyny + Dislike, contempt, or prejudice against women + + 2024-09-30 + accepted + + + + - Security Breach - Something that acts as or causes Security Breach - - - - - + + + + + + + Data Breach + Something that acts as or causes Data Breach + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit + + - + - + - Impact to Rights - Something that acts as or causes Impact to Rights - - - This concept was called "ImpactToRights" in DPV 2.0 - + + + + + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Scam - Something that acts as or causes Scam - - - + + + + Obstruction of Rights + Interference with or blocking of the exercise of rights + + In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + accepted + + + + + + + + + + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - - - - - - - Risk Concepts - N3 serialiation + + + + + + + + + Phishing Scam + Something that acts as or causes Phishing Scam + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + Equipment Failure + Something that acts as or causes Equipment Failure + + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Harassment + + accepted + + + + + + + + + + + Data Processing Bias + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + + Societal Bias + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + + + + Spoofing + Something that acts as or causes Spoofing + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + + 2022-08-19 + 2024-08-16 + accepted + Georg P. Krog + + + + + + + + + + + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + + Accidental Misuse + Accidental Misuse + + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + + + + + + Requirements Bias + Bias that occurs in or during requirements creation + + Requirements bias also represents occasions for the human cognitive biases to manifest + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + + Physical Harm + + accepted + + + + + + + + + + Detriment + Something that acts as or causes Detriment + + 2022-03-23 + 2024-08-16 + accepted + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + + + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + + + + + + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Non-Material Damage + Something that acts as or causes Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Language Discrimination + Discrimination based on a person's language, often linked to national origin or ethnicity + + 2024-09-30 + accepted + + + + + + + + + + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit + + + + + + + + + + + + Scam + Something that acts as or causes Scam + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Transphobia + Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + + 2024-09-30 + accepted + + + + + + + + + + + + + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + Guides for Data Privacy Vocabulary + + + + + + + + + + + + Authorisation Failure + Something that acts as or causes Authorisation Failure + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + + Malicious Code Attack + Something that acts as or causes Malicious Code Attack + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + Primer for Data Privacy Vocabulary + + + + + + + + + + + Injury + Something that acts as or causes Injury + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + + + Sex Discrimination + Discrimination based on a person's biological sex + + 2024-09-30 + accepted + + + + + + + + + + + Judicial Penalty + Something that involves or causes judicial penalties to be paid + + accepted + + + + + + + + + + + Denial of Rights + The refusal or withholding or denial of the existence or applicability of rights + + The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + accepted + + + + + + + + + + + Ethnic Discrimination + Discrimination against individuals based on their ethnicity or cultural heritage + + 2024-09-30 + accepted + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + - - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 - 2024-08-16 + + + + + Sampling Bias + Bias that occurs when data records are not collected randomly from the intended population + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Georg P. Krog + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Identity Theft - Something that acts as or causes Identity Theft - - - - 2022-08-17 + + + + Violation of Rights + The infringement or breach of rights in a manner that constitues a 'violation' of those rights + + This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - Malware Attack - Something that acts as or causes Malware Attack - - - - - + + + + Lose of Trust + Something that acts as or causes Loss of Trust + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources - - 2024-04-14 - 2024-08-16 + + + + Privacy + accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Authorisation Failure - Something that acts as or causes Authorisation Failure - - - - - 2022-08-17 - 2024-08-16 + + + + + accepted - Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Terrorism - Something that acts as or causes Terrorism - - + + + + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + @@ -1478,687 +2591,674 @@ Risk Concepts - RDF/XML serialiation - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - - accepted - - + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - Lose of Goodwill - Something that acts as or causes Loss of Goodwill - - + + + + + Data Corruption + Something that acts as or causes Corruption of Data + + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - + - Limitation of Rights - Something that acts as or causes Limitation of Rights - - This concept was called "LimitationOfRights" in DPV 2.0 - 2022-08-18 - 2024-08-16 + + + + + + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it + accepted - Georg P. Krog, Harshvardhan J. Pandit - + - + - Violation of Rights - Something that acts as or causes Violation of Rights - - This concept was called "ViolationOfRights" in DPV 2.0 - 2022-08-18 + + + + Benefit + Something that acts as or causes benefits + + 2022-03-23 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - + - Unauthorised Resource Use - Something that acts as or causes Unauthorised Resource Use - - - + + + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + + Data Aggregation Bias + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - + - Spoofing - Something that acts as or causes Spoofing - - - + + + + + System Malfunction + Something that acts as or causes System Malfunction - - + Here system refers to both hardware and software systems + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form - - 2024-04-14 - 2024-08-16 + + + + + Confirmation Bias + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Georg P. Krog, Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - - - 2022-08-19 - 2024-08-16 + + + + + Racial Discrimination + Discrimination against individuals because of their racial background or skin color + + 2024-09-30 accepted - Georg P. Krog - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society - + + + + + Group Attribution Bias + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Accidental Misuse - Accidental Misuse - + + + + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - - accepted - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - - - Sexual Violence - Something that acts as or causes Sexual Violence - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - - - - 2022-08-17 - 2024-08-16 + + + + + Gender Discrimination + Discrimination based on a person's gender identity or gender expression + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - User Risks - Concepts associated with risks that arise due to User or Human use - + + + + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 + + + + Sexual Violence + Something that acts as or causes Sexual Violence + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + + + + + Indirect Discrimination + Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + + 2024-09-30 accepted - + - + - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - - 2022-08-17 - 2024-08-16 + + + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement + accepted - Harshvardhan J. Pandit - + - + - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large + + + + Reputational Risk + Risks and issues that affect the reputation of the organisation accepted - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - - Human Errors - Something that acts as or causes Human Errors - - - 2022-08-17 - 2024-08-16 + + + + + Cognitive Bias + Bias that occurs when humans are processing and interpreting information + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + + Selection Bias + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - + - - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - - - - + + + + + Disability Discrimination + Discrimination against individuals based on physical or mental disabilities + + 2024-09-30 accepted - + - + - - Physical Assault - Something that acts as or causes Physical Assault - - - 2022-08-17 - 2024-08-16 + + + + + SexualOrientation Discrimination + Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - - - - - - - Risk Concepts - Turtle serialiation + + + + + + + + Direct Discrimination + Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + + 2024-09-30 + accepted + + - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Primer for Data Privacy Vocabulary - - - - + - Equipment Failure - Something that acts as or causes Equipment Failure - + + + + + System Failure + Something that acts as or causes System Failure - Here equipment refers to physical equipment - + Here system refers to both hardware and software systems + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Unauthorised System Access - Something that acts as or causes Unauthorised System Access - - - - - 2022-08-17 - 2024-08-16 + + + + + Implicit Bias + Bias that occurs when a human makes an association or assumption based on their mental models and memories + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 - 2024-08-16 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - - - Examples for Data Privacy Vocabulary - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - - Risk Concepts - JSON-LD serialiation + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - - accepted - - - - - - - - Physical Harm - - accepted - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 - 2024-08-16 + + + + + accepted - Georg P. Krog, Harshvardhan J. Pandit - + - + - Prevent Exercising of Rights - Something that acts as or causes Prevent Exercising of Rights - - This concept was called "PreventExercisingOfRights" in DPV 2.0 - 2022-08-18 + + + Copyright Violation + Something that acts as or causes Copyright Violation + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - + - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - - - - Individual Health & Safety - - accepted - - + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - - Guides for Data Privacy Vocabulary - - + + + + + Risk Concepts - JSON-LD serialiation - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - - - - - Risk Concepts - HTML serialiation + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html diff --git a/2.1-dev/risk/modules/risk_consequences.ttl b/2.1-dev/risk/modules/risk_taxonomy.ttl similarity index 52% rename from 2.1-dev/risk/modules/risk_consequences.ttl rename to 2.1-dev/risk/modules/risk_taxonomy.ttl index 87558834f..d0e401bcc 100644 --- a/2.1-dev/risk/modules/risk_consequences.ttl +++ b/2.1-dev/risk/modules/risk_taxonomy.ttl @@ -17,17 +17,38 @@ risk:AccidentalMisuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:UserRisks ; + skos:broader risk:Misuse ; skos:definition "Accidental Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Accidental Misuse"@en . +risk:AgeDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's age, often impacting older or younger individuals"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Age Discrimination"@en . + risk:AuthorisationFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -36,38 +57,62 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Authorisation Failure"@en . risk:AvailabilityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:DataBreach ; - skos:inScheme risk:risk-consequences-classes . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-taxonomy-classes . risk:Benefit a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Compensation ; skos:definition "Something that acts as or causes benefits"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Benefit"@en . +risk:Bias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RiskConcept ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Bias"@en . + risk:Blackmail a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -76,15 +121,18 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Blackmail"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Blackmail"@en . risk:BruteForceAuthorisations a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -93,16 +141,32 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Brute Force Authorisations"@en . +risk:CasteDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's caste, a form of social stratification found in some cultures"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Caste Discrimination"@en . + risk:Coercion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -111,52 +175,82 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Coercion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coercion"@en . +risk:CognitiveBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Cognitive Bias"@en . + risk:Compensation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compensation"@en . risk:ComponentFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . risk:ComponentMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . risk:CompromiseAccount a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -165,17 +259,18 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account"@en . risk:CompromiseAccountCredentials a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -184,15 +279,18 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account Credentials"@en . risk:ConfidentialityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -201,15 +299,48 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:DataBreach ; + skos:broader risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confidentiality Breach"@en . +risk:ConfirmationBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Confirmation Bias"@en . + +risk:ConfoundingVariablesBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Confounding Variables Bias"@en . + risk:CopyrightViolation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -218,14 +349,33 @@ risk:CopyrightViolation a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Copyright Violation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Copyright Violation"@en . +risk:CoverageBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Coverage Bias"@en . + risk:Cryptojacking a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -234,15 +384,17 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Cryptojacking"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cryptojacking"@en . risk:Damage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -250,12 +402,50 @@ risk:Damage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Damage"@en . +risk:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk:DataBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Data Bias"@en . + risk:DataBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -266,17 +456,18 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:SecurityBreach ; + skos:broader risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Breach"@en . risk:DataCorruption a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -285,16 +476,34 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . +risk:DataProcessingBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Data Processing Bias"@en . + risk:DenialServiceAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -303,15 +512,16 @@ risk:DenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk:Detriment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -319,25 +529,63 @@ risk:Detriment a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Detriment"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Detriment"@en . +risk:DirectDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Direct Discrimination"@en . + +risk:DisabilityDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination against individuals based on physical or mental disabilities"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Disability Discrimination"@en . + risk:Discrimination a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dct:created "2022-08-19"^^xsd:date, + "2024-09-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Discrimination"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RiskConcept, + risk:SocietalRisk ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, + "Something that acts as or causes Discrimination"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Discrimination"@en . risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -346,25 +594,31 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:DenialServiceAttack ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . risk:EnvironmentalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Environmental Risk"@en . risk:EquipmentFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -373,16 +627,19 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . risk:EquipmentMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -391,16 +648,18 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . risk:ErroneousSystemUse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -411,12 +670,43 @@ risk:ErroneousSystemUse a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Erroneous System Use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Erroneous System Use"@en . +risk:EthnicDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Racism ; + skos:definition "Discrimination against individuals based on their ethnicity or cultural heritage"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Ethnic Discrimination"@en . + +risk:ExcellenceDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Favoritism towards individuals deemed more competent or superior, often at the expense of others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Excellence Discrimination"@en . + risk:ExposureToHarmfulSpeech a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -427,23 +717,28 @@ risk:ExposureToHarmfulSpeech a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Harmful Speech"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . risk:ExternalSecurityThreat a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "External Security Threat"@en . risk:Extorsion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -452,39 +747,30 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Extorsion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Extorsion"@en . -risk:Fee a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source "DGA 2.10"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "modified"@en ; - skos:broader risk:FinancialImpact ; - skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Fee"@en . - risk:FinancialImpact a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Impact"@en . risk:FinancialLoss a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -495,12 +781,16 @@ risk:FinancialLoss a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Loss"@en . risk:Fraud a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -509,15 +799,73 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Fraud"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Fraud"@en . +risk:GenderDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Discrimination based on a person's gender identity or gender expression"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Gender Discrimination"@en . + +risk:GeographicDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's geographical origin or residence"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Geographic Discrimination"@en . + +risk:GroupAttributionBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Group Attribution Bias"@en . + +risk:Harassment a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Harassment"@en . + risk:Harm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -525,13 +873,30 @@ risk:Harm a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; skos:definition "Something that acts as or causes Harm to humans"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . +risk:Homophobia a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SexualOrientationDiscrimination ; + skos:definition "Hostility or prejudice against individuals who are or are perceived to be homosexual"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Homophobia"@en . + risk:HumanErrors a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -542,12 +907,16 @@ risk:HumanErrors a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Human Errors"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Human Errors"@en . risk:IdentityFraud a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -556,15 +925,18 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Identity Fraud"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Fraud"@en . risk:IdentityTheft a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -573,15 +945,16 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Identity Theft"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Theft"@en . risk:IllegalDataProcessing a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -592,30 +965,101 @@ risk:IllegalDataProcessing a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . +risk:ImplicitBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Implicit Bias"@en . + +risk:InGroupBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "In-Group Bias"@en . + +risk:IndirectDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Indirect Discrimination"@en . + risk:IndividualHealthSafety a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Health & Safety"@en . risk:IndividualRisk a rdfs:Class, - skos:Concept ; + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Risk"@en . +risk:InformativenessBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:EngineeringDecisionBias ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Informativeness Bias"@en . + risk:Injury a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -624,33 +1068,43 @@ risk:Injury a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Injury"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Injury"@en . risk:IntegrityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach, - risk:IntegrityConcept ; - skos:inScheme risk:risk-consequences-classes . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-taxonomy-classes . risk:IntentionalMisuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:UserRisks ; + skos:broader risk:Misuse ; skos:definition "Intentional Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intentional Misuse"@en . risk:InterceptCommunications a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -659,46 +1113,70 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Interception of Communications"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . risk:JudicialCosts a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:FinancialLoss ; skos:definition "Something that involves or causes judicial costs to be paid"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Judicial Costs"@en . risk:JudicialPenalty a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:FinancialLoss ; skos:definition "Something that involves or causes judicial penalties to be paid"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Judicial Penalty"@en . +risk:LanguageDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Language Discrimination"@en . + risk:LegalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Legal Risk"@en . risk:LoseCredibility a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -709,12 +1187,15 @@ risk:LoseCredibility a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Credibility"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Credibility"@en . risk:LoseCustomerConfidence a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -725,12 +1206,15 @@ risk:LoseCustomerConfidence a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Customer Confidence"@en . risk:LoseGoodwill a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -741,12 +1225,15 @@ risk:LoseGoodwill a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Goodwill"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Goodwill"@en . risk:LoseNegotiatingCapacity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -757,12 +1244,15 @@ risk:LoseNegotiatingCapacity a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Negotiating Capacity"@en . risk:LoseOpportunity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -773,12 +1263,15 @@ risk:LoseOpportunity a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Opportunity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Opportunity"@en . risk:LoseReputation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -789,12 +1282,15 @@ risk:LoseReputation a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Reputation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Reputation"@en . risk:LoseTrust a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -805,12 +1301,30 @@ risk:LoseTrust a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Trust"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Trust"@en . +risk:MaliciousActivity a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Malicious Activity"@en . + risk:MaliciousCodeAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -819,17 +1333,19 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malicious Code Attack"@en . risk:MalwareAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -838,17 +1354,17 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Malware Attack"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malware Attack"@en . risk:MaterialDamage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -856,13 +1372,44 @@ risk:MaterialDamage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Material Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk:Misandry a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Dislike, contempt, or prejudice against men"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Misandry"@en . + +risk:Misogyny a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Dislike, contempt, or prejudice against women"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Misogyny"@en . + risk:Misuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -870,12 +1417,29 @@ risk:Misuse a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Misuse"@en . +risk:NationalityDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's nationality or citizenship"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Nationality Discrimination"@en . + risk:NonMaterialDamage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -883,36 +1447,92 @@ risk:NonMaterialDamage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Non-Material Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk:NonNormalityBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Non-Normality Bias"@en . + +risk:NonResponseBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Non-Response Bias"@en . + risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that arise during operational processes"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Operational Security Risk"@en . +risk:OutGroupHomogeneityBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + risk:Payment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Payment"@en . risk:PersonalSafetyEndangerment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -923,12 +1543,16 @@ risk:PersonalSafetyEndangerment a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Personal Safety Endangerment"@en . risk:PhishingScam a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -937,15 +1561,17 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Phishing Scam"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Phishing Scam"@en . risk:PhysicalAssault a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -954,32 +1580,41 @@ risk:PhysicalAssault a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Physical Assault"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Assault"@en . risk:PhysicalHarm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Harm"@en . risk:Privacy a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Privacy"@en . risk:PsychologicalHarm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -988,14 +1623,16 @@ risk:PsychologicalHarm a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Psychological Harm"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Psychological Harm"@en . risk:PublicOrderBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1006,27 +1643,75 @@ risk:PublicOrderBreach a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Public Order Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Public Order Breach"@en . +risk:RacialDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Racism ; + skos:definition "Discrimination against individuals because of their racial background or skin color"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Racial Discrimination"@en . + +risk:Racism a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Prejudice or discrimination against people based on their race"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Racism"@en . + risk:Reidentification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . +risk:ReligiousDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's religious beliefs or practices"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Religious Discrimination"@en . + risk:Renumeration a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1034,49 +1719,134 @@ risk:Renumeration a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Remuneration"@en . risk:ReputationalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reputational Risk"@en . +risk:RequirementsBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + +risk:ReverseDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Reverse Discrimination"@en . + risk:Reward a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reward"@en . +risk:RightEroded a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Erosion of Rights"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightObstructed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Obstruction of Rights"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightsDenial a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Denial of Rights"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk:RightsExercisePrevention a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Prevent Exercising of Rights"@en ; - skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsImpact a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1085,44 +1855,85 @@ risk:RightsImpact a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Impact, - risk:SocietalRisk ; + skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Impact to Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Impact to Rights"@en ; - skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsLimitation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Limitation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Limitation of Rights"@en ; - skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightsUnfulfilled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Failure to meet or complete the fulfilment of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Unfulfilment of Rights"@en ; + skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsViolation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Violation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Rights"@en ; - skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RuleBasedSystemDesign a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . risk:Sabotage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1131,16 +1942,34 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Sabotage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sabotage"@en . +risk:SamplingBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sampling Bias"@en . + risk:Scam a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1149,28 +1978,35 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Scam"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Scam"@en . risk:SecurityAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Attack"@en . risk:SecurityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1179,17 +2015,87 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Breach"@en . +risk:SelectionBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Selection Bias"@en . + +risk:SexDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Discrimination based on a person's biological sex"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sex Discrimination"@en . + +risk:Sexism a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sexism"@en . + +risk:SexualHarassment a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sexual Harassment"@en . + +risk:SexualOrientationDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "SexualOrientation Discrimination"@en . + risk:SexualViolence a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1198,14 +2104,33 @@ risk:SexualViolence a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Sexual Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sexual Violence"@en . +risk:SimpsonsParadoxBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + risk:SocialDisadvantage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1213,53 +2138,94 @@ risk:SocialDisadvantage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Social Disadvantage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Social Disadvantage"@en . +risk:SocietalBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Societal Bias"@en . + risk:SocietalHealthSafety a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Health & Safety"@en . risk:SocietalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Risk"@en . risk:Spoofing a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Spoofing"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Spoofing"@en . +risk:StatisticalBias a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, + risk:RiskConcept ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Statistical Bias"@en . + risk:SystemFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1268,16 +2234,20 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:SystemIntrusion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1286,17 +2256,18 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes System Intrusion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Intrusion"@en . risk:SystemMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1305,16 +2276,18 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:Terrorism a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1325,12 +2298,32 @@ risk:Terrorism a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Terrorism"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Terrorism"@en . +risk:Transphobia a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Transphobia"@en . + risk:UnauthorisedAccesstoPremises a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1339,30 +2332,35 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . risk:UnauthorisedActivity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Activity"@en . risk:UnauthorisedCodeAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1371,16 +2369,18 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Access"@en . risk:UnauthorisedCodeDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1389,15 +2389,18 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk:UnauthorisedCodeModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1406,15 +2409,18 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Modification"@en . risk:UnauthorisedDataAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1423,15 +2429,18 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Access"@en . risk:UnauthorisedDataDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1440,15 +2449,18 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk:UnauthorisedDataModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1457,15 +2469,18 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Modification"@en . risk:UnauthorisedInformationDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1474,29 +2489,35 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk:UnauthorisedReidentification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . risk:UnauthorisedResourceUse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1505,15 +2526,19 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Resource Use"@en . risk:UnauthorisedSystemAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1522,16 +2547,18 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Access"@en . risk:UnauthorisedSystemModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1540,15 +2567,19 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Modification"@en . risk:UnwantedCodeDeletion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1557,16 +2588,19 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Code Deletion"@en . risk:UnwantedDataDeletion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1575,16 +2609,18 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Data Deletion"@en . risk:UnwantedDisclosureData a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1593,25 +2629,28 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk:UserRisks a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "User Risks"@en . risk:ViolatingCodeOfConduct a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1620,15 +2659,17 @@ risk:ViolatingCodeOfConduct a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . risk:ViolatingContractualObligation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1637,15 +2678,17 @@ risk:ViolatingContractualObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk:ViolatingEthicsCode a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1654,15 +2697,17 @@ risk:ViolatingEthicsCode a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . risk:ViolatingLegalObligation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1671,25 +2716,29 @@ risk:ViolatingLegalObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Legal Obligations"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . risk:ViolatingPolicy a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Policy"@en . risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1698,15 +2747,18 @@ risk:ViolatingStatutoryObligations a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk:ViolenceAgainstChildren a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1715,9 +2767,9 @@ risk:ViolenceAgainstChildren a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Child Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . @@ -1728,6 +2780,7 @@ risk:ViolenceAgainstChildren a rdfs:Class, "http://www.w3.org/2004/02/skos/core" ; dct:contributor "Axel Polleres", "Beatriz Esteves", + "Daniel Doherty", "Delaram Golpayegani", "Fajar Ekaputra", "Georg P. Krog", @@ -1745,7 +2798,7 @@ risk:ViolenceAgainstChildren a rdfs:Class, dct:identifier "https://w3id.org/dpv/risk" ; dct:issued "2022-08-14"@en ; dct:license ; - dct:modified "2024-07-13"@en ; + dct:modified "2024-08-18"@en ; dct:publisher ; dct:source ; dct:title "Risk Concepts"@en ; @@ -1826,5 +2879,5 @@ risk:serialisation-ttl a profile:ResourceDescriptor ; profile:hasArtifact ; profile:hasRole role:guidance . -risk:risk-consequences-classes a skos:ConceptScheme . +risk:risk-taxonomy-classes a skos:ConceptScheme . diff --git a/2.1-dev/risk/risk-en.html b/2.1-dev/risk/risk-en.html index 239452705..1ff9e1027 100644 --- a/2.1-dev/risk/risk-en.html +++ b/2.1-dev/risk/risk-en.html @@ -1,3 +1,5 @@ + + @@ -379,6 +381,35 @@ +
    @@ -452,10 +483,45 @@

    Core Concepts

  • [=RiskMatrix=] to represent the popular risk analysis method for calculating risk levels based on likelihood and severity.
    • +
    • + risk:AvailabilityConcept: Indicates a concept is relevant to 'Availability' in CIA InfoSec model + go to full definition + +
    • +
    • + risk:ConfidentialityConcept: Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + go to full definition + +
    • risk:Incident: An actual or occured event go to full definition +
    • +
    • + risk:IntegrityConcept: Indicates a concept is relevant to 'Integrity' in CIA InfoSec model + go to full definition + +
    • +
    • + risk:PotentialConsequence: Indicates a concept can potentially be a 'consequence concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialImpact: Indicates a concept can potentially be a 'impact' concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialRisk: Indicates a concept can potentially be a 'risk' concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialRiskSource: Indicates a concept can potentially be a 'risk source' concept within an use-case + go to full definition +
    • risk:RiskManagement: Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk @@ -1246,8 +1312,8 @@

      Controls

    -
    -

    Consequences and Impacts

    +
    +

    Taxonomies

    @@ -1271,78 +1337,147 @@

    Consequences and Impacts

    dpv:hasImpact risk:RightsImpact . -

    The concepts taxonomy is broadly divided into the following categories:

    - - -
    -

    CIA Model

    -

    Confidentiality

    +
    +

    Potential Risk Sources

    • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:Coercion: Something that acts as or causes Coercion - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
        • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
        • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition
        • - risk:AvailabilityBreach: None - go to full definition + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
        • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition
        • - risk:IntegrityBreach: None - go to full definition + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ExternalSecurityThreat: Concepts associated with security threats that are likely to originate externally + go to full definition +
        +
      • + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition + +
      • +
      • + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition + +
      • +
      • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition +
          +
        • + risk:Blackmail: Something that acts as or causes Blackmail + go to full definition + +
        • +
        • + risk:Coercion: Something that acts as or causes Coercion + go to full definition + +
        • risk:Extorsion: Something that acts as or causes Extorsion go to full definition @@ -1367,16 +1502,6 @@

          Confidentiality

          risk:InterceptCommunications: Something that acts as or causes Interception of Communications go to full definition -
        • -
        • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition - -
        • -
        • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition -
        • risk:PhishingScam: Something that acts as or causes Phishing Scam @@ -1384,8 +1509,8 @@

          Confidentiality

        • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition
        • @@ -1394,40 +1519,45 @@

          Confidentiality

        • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:Spoofing: Something that acts as or causes Spoofing + go to full definition
        • +
        +
      • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition -
      • risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity go to full definition +
          +
        • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition
        • @@ -1454,6 +1585,11 @@

          Confidentiality

          risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition +
        • +
        • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition +
        • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1464,6 +1600,11 @@

          Confidentiality

          risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition +
        • +
        • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition +
        • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1474,6 +1615,11 @@

          Confidentiality

          risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification go to full definition +
        • +
        • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition +
        • risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access @@ -1481,78 +1627,71 @@

          Confidentiality

        • - risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data - go to full definition + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition
        • -
    - -

    Integrity

    -
    • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition
    • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition
    • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition
    • +
    + + +
  • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
  • +
  • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition -
  • risk:DataCorruption: Something that acts as or causes Corruption of Data go to full definition
  • - risk:IntegrityBreach: None - go to full definition - -
  • -
  • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition - -
  • -
  • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition + risk:EquipmentFailure: Something that acts as or causes Equipment Failure + go to full definition
  • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + go to full definition
  • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
  • @@ -1583,171 +1722,228 @@

    Integrity

  • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
  • - risk:SystemIntrusion: Something that acts as or causes System Intrusion - go to full definition + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition
  • + +
  • - risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises - go to full definition + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition + +
  • +
    +
    + +
    +

    Potential Risks

    +
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • -
    - -

    Availability

    -
    • - risk:AvailabilityBreach: None - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
    • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
    • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition
    • +
    +
  • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
      +
    • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
    • - risk:Cryptojacking: Something that acts as or causes Cryptojacking - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition
    • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
    • +
    • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition
      • - risk:AvailabilityBreach: None - go to full definition + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition
      • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition
      • - risk:IntegrityBreach: None - go to full definition + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
          +
        • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition
        • -
        -
      • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) - go to full definition + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition
      • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) - go to full definition + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
      • +
      +
    • +
    +
  • + + + +
  • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure - go to full definition + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition
  • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction - go to full definition + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition
  • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition + risk:CopyrightViolation: Something that acts as or causes Copyright Violation + go to full definition
  • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
  • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
      +
    • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
        +
      • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
      • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
      • +
      +
    • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition @@ -1755,87 +1951,76 @@

      Availability

  • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition +
  • -
    - -
    -

    User

    -
  • - risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use - go to full definition + risk:IndividualHealthSafety: None + go to full definition
  • - risk:HumanErrors: Something that acts as or causes Human Errors - go to full definition + risk:Privacy: None + go to full definition
  • -
  • - risk:IntentionalMisuse: Intentional Misuse - go to full definition - +
  • - risk:Misuse: Something that acts as or causes Misuse - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
  • -
    -
    - -
    -

    Legal

    -
    • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition - -
    • + risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement + go to full definition + +
    • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition +
        +
      • + risk:Blackmail: Something that acts as or causes Blackmail + go to full definition
      • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:Coercion: Something that acts as or causes Coercion + go to full definition
      • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:Extorsion: Something that acts as or causes Extorsion + go to full definition
      • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition + risk:Fraud: Something that acts as or causes Fraud + go to full definition
      • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition
      • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition
      • -
    -
    - -
    -

    Reputational

    -
    +
  • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition +
  • -
    - -
    -

    Societal

    -
    -
    - -
    -

    Individual

    -
      +
    +
  • - risk:Harm: Something that acts as or causes Harm to humans - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
  • - risk:SexualViolence: Something that acts as or causes Sexual Violence - go to full definition + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition +
      +
    • + risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + go to full definition
    • - risk:ViolenceAgainstChildren: Something that acts as or causes Child Violence - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
    • -
  • -
    - -
    -

    Environmental

    -
    -
    - -
    -

    Financial

    -
    • - risk:Benefit: Something that acts as or causes benefits - go to full definition + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition +
        +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • +
      +
    • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
    • - risk:Fee: Something that acts as or provides fees e.g. for using a service - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
    • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • +
    +
  • - risk:JudicialCosts: Something that involves or causes judicial costs to be paid - go to full definition + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
      +
    • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition
      • - risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid - go to full definition + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition
      • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition
      • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition
      • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition
      • -
  • -
    - -
    -

    Bias

    -

    Note: These are intended to represent bias concepts in general e.g. applicable for any technology. The AI extension contains an additional set of concepts that extend these concepts to represent biases that are specific to the development and use of AI.

    -
    • - risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information - go to full definition -
        + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • - risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - go to full definition + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition
      • - risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - go to full definition + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition
      • - risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories - go to full definition + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition
      • - risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics - go to full definition + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition
        • - risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - go to full definition + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition
        • +
        +
      • - risk:RequirementsBias: Bias that occurs in or during requirements creation - go to full definition + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition
      • - risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - go to full definition + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition
      • - risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - go to full definition + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition
      • - risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - go to full definition + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition
        • - risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - go to full definition + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition
        • +
        +
      • +
      +
    • - risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - go to full definition + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition
    • - risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - go to full definition + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition
    • - risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - go to full definition + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition
      • - risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - go to full definition + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition
      • - risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - go to full definition + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition
      • - risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - go to full definition + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
    • +
    • + risk:SocietalHealthSafety: None + go to full definition + +
    • +
    • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
    • +
    + +
  • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition
    • - risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - go to full definition + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition
    • - risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - go to full definition + risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + go to full definition
    • - risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population - go to full definition + risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition + +
    • +
    • + risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + go to full definition + +
    • +
    • + risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition + +
    • +
    • + risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition
  • +
  • + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition +
  • +
  • + risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct + go to full definition + +
  • +
  • + risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations + go to full definition + +
  • +
  • + risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code + go to full definition + +
  • +
  • + risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations + go to full definition + +
  • +
  • + risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy + go to full definition + +
  • +
  • + risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations + go to full definition + +
  • -
    - - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    -
    -

    Risk Matrix 3x3

    - - - - - - - - - - - - - - - - - - - - - - - - - -
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    +

    Potential Consequences

    +
      +
    • + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
        • +
        • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
        • +
        • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
        • +
        • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
        • +
        • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
        • +
        • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
        • +
        • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
        • +
        • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
        • +
        • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
            • +
            +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ComponentFailure: Something that acts as or causes Component Failure + go to full definition + +
    • +
    • + risk:ComponentMalfunction: Something that acts as or causes Component Malfunction + go to full definition + +
    • +
    • + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition + +
    • +
    • + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition + +
    • +
    • + risk:CopyrightViolation: Something that acts as or causes Copyright Violation + go to full definition + +
    • +
    • + risk:DataCorruption: Something that acts as or causes Corruption of Data + go to full definition + +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:EquipmentFailure: Something that acts as or causes Equipment Failure + go to full definition + +
    • +
    • + risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + go to full definition + +
    • +
    • + risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use + go to full definition + +
    • +
    • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
        +
      • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
          +
        • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition + +
        • +
        • + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition + +
        • +
        +
      • +
      • + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
          +
        • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition + +
        • +
        • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
        • +
        • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:HumanErrors: Something that acts as or causes Human Errors + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
    • +
    • + risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement + go to full definition + +
    • +
    • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition + +
    • +
    • + risk:Misuse: Something that acts as or causes Misuse + go to full definition + +
    • +
    • + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition + +
    • +
    • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition +
        +
      • + risk:LoseCredibility: Something that acts as or causes Loss of Credibility + go to full definition + +
      • +
      • + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition + +
      • +
      • + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition + +
      • +
      • + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition + +
      • +
      • + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition + +
      • +
      • + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition + +
      • +
      • + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition + +
      • +
      +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition + +
    • +
    • + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
        +
      • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
          +
        • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
        • +
        • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
        • +
        • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
        • +
        • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
        • +
        • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
        • +
        • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
        • +
        • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
        • +
        • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
        • +
        • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
        • +
        • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
            +
          • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
          • +
          • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
          • +
          +
        • +
        • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
        • +
        • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
        • +
        • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
            +
          • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
          • +
          • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
          • +
          • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
          • +
          • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
          • +
          • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
          • +
          +
        • +
        • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
            +
          • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
          • +
          +
        • +
        +
      • +
      • + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition + +
      • +
      • + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition + +
      • +
      • + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition +
          +
        • + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
        • +
        • + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
        • +
        • + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
        • +
        • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
        • +
        • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
        • +
        • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
        • +
        • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
        • +
        +
      • +
      • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
      • +
      • + risk:SocietalHealthSafety: None + go to full definition + +
      • +
      • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
      • +
      +
    • +
    • + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition + +
    • +
    • + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition +
        +
      • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
      • +
      • + risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + go to full definition + +
      • +
      • + risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition + +
      • +
      • + risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + go to full definition + +
      • +
      • + risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition + +
      • +
      • + risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + go to full definition + +
      • +
      • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
      • +
      • + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
      • +
      • + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition + +
      • +
      • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
      • +
      • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
      • +
      • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
      • +
      +
    • +
    • + risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct + go to full definition + +
    • +
    • + risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations + go to full definition + +
    • +
    • + risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code + go to full definition + +
    • +
    • + risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations + go to full definition + +
    • +
    • + risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy + go to full definition + +
    • +
    • + risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations + go to full definition + +
    • +
    +
    + +
    +

    Potential Impacts

    +
      +
    • + risk:Damage: Something that acts as or causes Damage + go to full definition + +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
        +
      • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
          +
        • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition + +
        • +
        • + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition + +
        • +
        +
      • +
      • + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
          +
        • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition + +
        • +
        • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
        • +
        • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:MaterialDamage: Something that acts as or causes Material Damage + go to full definition + +
    • +
    • + risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage + go to full definition + +
    • +
    • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition +
        +
      • + risk:LoseCredibility: Something that acts as or causes Loss of Credibility + go to full definition + +
      • +
      • + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition + +
      • +
      • + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition + +
      • +
      • + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition + +
      • +
      • + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition + +
      • +
      • + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition + +
      • +
      • + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition + +
      • +
      +
    • +
    • + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
        +
      • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
          +
        • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
        • +
        • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
        • +
        • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
        • +
        • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
        • +
        • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
        • +
        • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
        • +
        • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
        • +
        • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
        • +
        • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
        • +
        • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
            +
          • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
          • +
          • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
          • +
          +
        • +
        • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
        • +
        • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
        • +
        • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
            +
          • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
          • +
          • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
          • +
          • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
          • +
          • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
          • +
          • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
          • +
          +
        • +
        • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
            +
          • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
          • +
          +
        • +
        +
      • +
      • + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition + +
      • +
      • + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition + +
      • +
      • + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition +
          +
        • + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
        • +
        • + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
        • +
        • + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
        • +
        • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
        • +
        • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
        • +
        • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
        • +
        • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
        • +
        +
      • +
      • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
      • +
      • + risk:SocietalHealthSafety: None + go to full definition + +
      • +
      • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
      • +
      +
    • +
    +
    + +
    +

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentialityIntegrityAvailability
    risk:AccidentalMisuse
    risk:AgeDiscrimination
    risk:AuthorisationFailure
    risk:AvailabilityBreach
    risk:Benefit
    risk:Bias
    risk:Blackmail
    risk:BruteForceAuthorisations
    risk:CasteDiscrimination
    risk:Coercion
    risk:CognitiveBias
    risk:Compensation
    risk:ComponentFailure
    risk:ComponentMalfunction
    risk:CompromiseAccount
    risk:CompromiseAccountCredentials
    risk:ConfidentialityBreach
    risk:ConfirmationBias
    risk:ConfoundingVariablesBias
    risk:CopyrightViolation
    risk:CoverageBias
    risk:Cryptojacking
    risk:Damage
    risk:DataAggregationBias
    risk:DataBias
    risk:DataBreach
    risk:DataCorruption
    risk:DataProcessingBias
    risk:DenialServiceAttack
    risk:Detriment
    risk:DirectDiscrimination
    risk:DisabilityDiscrimination
    risk:Discrimination
    risk:DistributedDenialServiceAttack
    risk:EnvironmentalRisk
    risk:EquipmentFailure
    risk:EquipmentMalfunction
    risk:ErroneousSystemUse
    risk:EthnicDiscrimination
    risk:ExcellenceDiscrimination
    risk:ExposureToHarmfulSpeech
    risk:ExternalSecurityThreat
    risk:Extorsion
    risk:FinancialImpact
    risk:FinancialLoss
    risk:Fraud
    risk:GenderDiscrimination
    risk:GeographicDiscrimination
    risk:GroupAttributionBias
    risk:Harassment
    risk:Harm
    risk:Homophobia
    risk:HumanErrors
    risk:IdentityFraud
    risk:IdentityTheft
    risk:IllegalDataProcessing
    risk:ImplicitBias
    risk:IndirectDiscrimination
    risk:IndividualHealthSafety
    risk:IndividualRisk
    risk:InformativenessBias
    risk:InGroupBias
    risk:Injury
    risk:IntegrityBreach
    risk:IntentionalMisuse
    risk:InterceptCommunications
    risk:JudicialCosts
    risk:JudicialPenalty
    risk:LanguageDiscrimination
    risk:LegalRisk
    risk:LoseCredibility
    risk:LoseCustomerConfidence
    risk:LoseGoodwill
    risk:LoseNegotiatingCapacity
    risk:LoseOpportunity
    risk:LoseReputation
    risk:LoseTrust
    risk:MaliciousActivity
    risk:MaliciousCodeAttack
    risk:MalwareAttack
    risk:MaterialDamage
    risk:Misandry
    risk:Misogyny
    risk:Misuse
    risk:NationalityDiscrimination
    risk:NonMaterialDamage
    risk:NonNormalityBias
    risk:NonResponseBias
    risk:OperationalSecurityRisk
    risk:OutGroupHomogeneityBias
    risk:Payment
    risk:PersonalSafetyEndangerment
    risk:PhishingScam
    risk:PhysicalAssault
    risk:PhysicalHarm
    risk:Privacy
    risk:PsychologicalHarm
    risk:PublicOrderBreach
    risk:RacialDiscrimination
    risk:Racism
    risk:Reidentification
    risk:ReligiousDiscrimination
    risk:Renumeration
    risk:ReputationalRisk
    risk:RequirementsBias
    risk:ReverseDiscrimination
    risk:Reward
    risk:RightEroded
    risk:RightObstructed
    risk:RightsDenial
    risk:RightsExercisePrevention
    risk:RightsImpact
    risk:RightsLimitation
    risk:RightsUnfulfilled
    risk:RightsViolation
    risk:RuleBasedSystemDesign
    risk:Sabotage
    risk:SamplingBias
    risk:Scam
    risk:SecurityAttack
    risk:SecurityBreach
    risk:SelectionBias
    risk:SexDiscrimination
    risk:Sexism
    risk:SexualHarassment
    risk:SexualOrientationDiscrimination
    risk:SexualViolence
    risk:SimpsonsParadoxBias
    risk:SocialDisadvantage
    risk:SocietalBias
    risk:SocietalHealthSafety
    risk:SocietalRisk
    risk:Spoofing
    risk:StatisticalBias
    risk:SystemFailure
    risk:SystemIntrusion
    risk:SystemMalfunction
    risk:Terrorism
    risk:Transphobia
    risk:UnauthorisedAccesstoPremises
    risk:UnauthorisedActivity
    risk:UnauthorisedCodeAccess
    risk:UnauthorisedCodeDisclosure
    risk:UnauthorisedCodeModification
    risk:UnauthorisedDataAccess
    risk:UnauthorisedDataDisclosure
    risk:UnauthorisedDataModification
    risk:UnauthorisedInformationDisclosure
    risk:UnauthorisedReidentification
    risk:UnauthorisedResourceUse
    risk:UnauthorisedSystemAccess
    risk:UnauthorisedSystemModification
    risk:UnwantedCodeDeletion
    risk:UnwantedDataDeletion
    risk:UnwantedDisclosureData
    risk:UserRisks
    risk:ViolatingCodeOfConduct
    risk:ViolatingContractualObligation
    risk:ViolatingEthicsCode
    risk:ViolatingLegalObligation
    risk:ViolatingPolicy
    risk:ViolatingStatutoryObligations
    risk:ViolenceAgainstChildren
    + +
    + +
    +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    + + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    3 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + +
    +

    Accidental Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Accidental Misuse

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalMisusePrefixrisk
    LabelAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse + → risk:UserRisks + → dpv:RiskConcept +
    DefinitionAccidental Misuse
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Age Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAgeDiscriminationPrefixrisk
    LabelAge Discrimination
    IRIhttps://w3id.org/dpv/risk#AgeDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's age, often impacting older or younger individuals
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Authorisation Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    None

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityBreachPrefixrisk
    LabelNone
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Availability Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityConceptPrefixrisk
    LabelAvailability Concept
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Availability Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + +
    +

    Avoid Source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that avoids the risk source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + +
    +

    Benefit

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBenefitPrefixrisk
    LabelBenefit
    IRIhttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Compensation + → risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes benefits
    Date Created2022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBiasPrefixrisk
    LabelBias
    IRIhttps://w3id.org/dpv/risk#Bias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskConcept +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    + + + + + + + +
    +

    Blackmail

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBlackmailPrefixrisk
    LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Blackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Brute Force Authorisations

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBruteForceAuthorisationsPrefixrisk
    LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Caste Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCasteDiscriminationPrefixrisk
    LabelCaste Discrimination
    IRIhttps://w3id.org/dpv/risk#CasteDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's caste, a form of social stratification found in some cultures
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Change Consequence

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + +
    +

    Change Impact

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + + +
    +

    Coercion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Coercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Cognitive Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCognitiveBiasPrefixrisk
    LabelCognitive Bias
    IRIhttps://w3id.org/dpv/risk#CognitiveBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when humans are processing and interpreting information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    + + + + + + +
    +

    Compensation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Component Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentFailurePrefixrisk
    LabelComponent Failure
    IRIhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Component Failure
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Component Malfunction

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentMalfunctionPrefixrisk
    LabelComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Component Malfunction
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + + + +
    +

    Compromise Account

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiser
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Compromise Account Credentials

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Account Credentials to be compromised
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Confidentiality Breach

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityBreachPrefixrisk
    LabelConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Confidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Confidentiality Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityConceptPrefixrisk
    LabelConfidentiality Concept
    IRIhttps://w3id.org/dpv/risk#ConfidentialityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Confidentiality Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityIncidentPrefixrisk
    LabelConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Confirmation Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfirmationBiasPrefixrisk
    LabelConfirmation Bias
    IRIhttps://w3id.org/dpv/risk#ConfirmationBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Confounding Variables Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfoundingVariablesBiasPrefixrisk
    LabelConfounding Variables Bias
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + +
    +

    Consequence Control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConsequenceControlPrefixrisk
    LabelConsequence Control
    IRIhttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionRisk Mitigation Measure that controls the Consequences
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + +
    +

    Containment Control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermContainmentControlPrefixrisk
    LabelContainment Control
    IRIhttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl to contain event
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK +
    + + + + + +
    +

    Copyright Violation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
    -

    Risk Matrix 5x5

    -
    TermCopyrightViolationPrefixrisk
    LabelCopyright Violation
    IRIhttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ViolatingObligation +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + + + +
    DefinitionSomething that acts as or causes Copyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Very LowLowModerateHighVery HighSee More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + + +
    +

    Coverage Bias

    + + + + + + + - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoverageBiasPrefixrisk
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]LabelCoverage Bias
    IRIhttps://w3id.org/dpv/risk#CoverageBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Cross-Border Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCrossBorderIncidentPrefixrisk
    LabelCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Cryptojacking

    + + - - - - - - + + + + - - - - - - + + - - - - - - - + + + - - - - - - - + + + + + + -
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]TermCryptojackingPrefixrisk
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]LabelCryptojacking
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    IRIhttps://w3id.org/dpv/risk#Cryptojacking
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    -
    + + + Broader/Parent types + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept + + + -
    -

    Risk Matrix 7x7

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    DefinitionSomething that acts as or causes Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Damage

    + + - - - - - - - - + + + + - - - - - - - - + + - - - - - - - - - + + + - - - - - - - - - + + + + + + -
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]TermDamagePrefixrisk
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]LabelDamage
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    IRIhttps://w3id.org/dpv/risk#Damage
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    -
    + + + Broader/Parent types + risk:LegalRisk + → dpv:RiskConcept + + + -
    + + + + + + + Definition + Something that acts as or causes Damage + + + -
    -

    Vocabulary Index

    -
    -

    Classes

    - - + + + + + + + + Date Created + 2022-03-30 + + + Date Modified + 2024-08-16 + + + Contributors + Harshvardhan J. Pandit + + + + See More: + section RISK-TAXONOMY in RISK + + + + +
    +
    +

    Data Aggregation Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataAggregationBiasPrefixrisk
    LabelData Aggregation Bias
    IRIhttps://w3id.org/dpv/risk#DataAggregationBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Data Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataBiasPrefixrisk
    LabelData Bias
    IRIhttps://w3id.org/dpv/risk#DataBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -2424,7 +9305,88 @@

    Classes

    +
    +

    Data Breach

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataBreachPrefixrisk
    LabelData Breach
    IRIhttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in DEX +
    +
    @@ -2432,87 +9394,371 @@

    Classes

    +
    +

    Data Corruption

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataCorruptionPrefixrisk
    LabelData Corruption
    IRIhttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Data Processing Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataProcessingBiasPrefixrisk
    LabelData Processing Bias
    IRIhttps://w3id.org/dpv/risk#DataProcessingBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Deliberate Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDeliberateIncidentPrefixrisk
    LabelDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to deliberate actions of a human
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    +
    +

    Denial of Service Attack (DoS)

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDenialServiceAttackPrefixrisk
    LabelDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    3 Likelihood Levels

    +
    +

    Detection Control

    - + - + - + - + - - @@ -2523,7 +9769,7 @@

    3 Likelihood Levels

    - + @@ -2536,18 +9782,15 @@

    3 Likelihood Levels

    - + - - - - + - @@ -2556,43 +9799,42 @@

    3 Likelihood Levels

    -
    -

    3 Risk Levels

    + + +
    +

    Detriment

    Term3LikelihoodLevelsDetectionControl Prefix risk
    Label3 Likelihood LevelsDetection Control
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevelshttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 3 Likelihood Levels from High to LowControl to detect event
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -2601,7 +9843,7 @@

    3 Risk Levels

    - + @@ -2614,18 +9856,21 @@

    3 Risk Levels

    - + - + + + + - + - @@ -2634,43 +9879,48 @@

    3 Risk Levels

    -
    -

    3 Severity Levels

    + + + +
    +

    Direct Discrimination

    Term3RiskLevelsDetriment Prefix risk
    Label3 Risk LevelsDetriment
    IRIhttps://w3id.org/dpv/risk#3RiskLevelshttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to LowSomething that acts as or causes Detriment
    Date Created2022-08-182022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2679,7 +9929,7 @@

    3 Severity Levels

    - + @@ -2692,18 +9942,15 @@

    3 Severity Levels

    - + - - - - + - @@ -2712,43 +9959,48 @@

    3 Severity Levels

    -
    -

    5 Likelihood Levels

    + + + +
    +

    Disability Discrimination

    Term3SeverityLevelsDirectDiscrimination Prefix risk
    Label3 Severity LevelsDirect Discrimination
    IRIhttps://w3id.org/dpv/risk#3SeverityLevelshttps://w3id.org/dpv/risk#DirectDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:Severity + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 3 Severity Levels from High to LowOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2757,7 +10009,7 @@

    5 Likelihood Levels

    - + @@ -2770,18 +10022,15 @@

    5 Likelihood Levels

    - + - - - - + - @@ -2790,43 +10039,47 @@

    5 Likelihood Levels

    -
    -

    5 Risk Levels

    + + + + +
    +

    Discrimination

    Term5LikelihoodLevelsDisabilityDiscrimination Prefix risk
    Label5 Likelihood LevelsDisability Discrimination
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevelshttps://w3id.org/dpv/risk#DisabilityDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:Likelihood + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very LowDiscrimination against individuals based on physical or mental disabilities
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2835,7 +10088,7 @@

    5 Risk Levels

    - + @@ -2848,18 +10101,21 @@

    5 Risk Levels

    - + - + + + + - + - @@ -2868,43 +10124,45 @@

    5 Risk Levels

    -
    -

    5 Severity Levels

    + + + +
    +

    Distributed Denial of Service Attack (DDoS)

    Term5RiskLevelsDiscrimination Prefix risk
    Label5 Risk LevelsDiscrimination
    IRIhttps://w3id.org/dpv/risk#5RiskLevelshttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskLevel + risk:RiskConcept +
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very Low[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]
    Date Created2022-08-182024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -2913,22 +10171,28 @@

    5 Severity Levels

    - + - + + + + - + - + + + + @@ -2937,7 +10201,7 @@

    5 Severity Levels

    - @@ -2945,42 +10209,42 @@

    5 Severity Levels

    - -
    -

    7 Likelihood Levels

    +
    +

    Environmental Incident

    Term5SeverityLevelsDistributedDenialServiceAttack Prefix risk
    Label5 Severity LevelsDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#5SeverityLevelshttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Severity + risk:DenialServiceAttack + → risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 5 Severity Levels from Very High to Very LowSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -2991,7 +10255,7 @@

    7 Likelihood Levels

    - + @@ -3004,18 +10268,15 @@

    7 Likelihood Levels

    - + - - - - + - @@ -3024,43 +10285,42 @@

    7 Likelihood Levels

    -
    -

    7 Risk Levels

    + + + +
    +

    Environmental Risk

    Term7LikelihoodLevelsEnvironmentalIncident Prefix risk
    Label7 Likelihood LevelsEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevelshttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types dpv:Likelihood + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood + risk:hasIncident
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely LowIncident caused due to environmental factors outside human controls
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -3069,7 +10329,7 @@

    7 Risk Levels

    - + @@ -3080,20 +10340,14 @@

    7 Risk Levels

    - - - - + - - - - + - @@ -3102,43 +10356,44 @@

    7 Risk Levels

    -
    -

    7 Severity Levels

    + + + + +
    +

    Equipment Failure

    Term7RiskLevelsEnvironmentalRisk Prefix risk
    Label7 Risk LevelsEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#7RiskLevelshttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely LowRisks and issues that have their origin in environment or can affect the environment at large
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3147,22 +10402,31 @@

    7 Severity Levels

    - + - + + + + - + + + + - + - + + + + @@ -3171,7 +10435,7 @@

    7 Severity Levels

    - @@ -3179,44 +10443,45 @@

    7 Severity Levels

    -
    -

    Accidental Incident

    + + + + + +
    +

    Equipment Malfunction

    Term7SeverityLevelsEquipmentFailure Prefix risk
    Label7 Severity LevelsEquipment Failure
    IRIhttps://w3id.org/dpv/risk#7SeverityLevelshttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Severity + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely LowSomething that acts as or causes Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3225,28 +10490,40 @@

    Accidental Incident

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -3255,30 +10532,33 @@

    Accidental Incident

    -
    -

    Accidental Misuse

    + + + +
    +

    Erroneous System Use

    TermAccidentalIncidentEquipmentMalfunction Prefix risk
    LabelAccidental IncidentEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#AccidentalIncidenthttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:OperationalSecurityRiskdpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situationsSomething that acts as or causes Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -3297,25 +10577,37 @@

    Accidental Misuse

    - + - + + + + - - - + + + + + + + + + + + + - @@ -3324,41 +10616,45 @@

    Accidental Misuse

    -
    -

    Authorisation Failure

    + + + +
    +

    Ethnic Discrimination

    TermAccidentalMisuseErroneousSystemUse Prefix risk
    LabelAccidental MisuseErroneous System Use
    IRIhttps://w3id.org/dpv/risk#AccidentalMisusehttps://w3id.org/dpv/risk#ErroneousSystemUse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    DefinitionAccidental MisuseSomething that acts as or causes Erroneous System Use
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - @@ -3372,37 +10668,28 @@

    Authorisation Failure

    - + - - - - + - + - - - - - - - - + + - @@ -3411,64 +10698,43 @@

    Authorisation Failure

    -
    -

    None

    + + + +
    +

    Excellence Discrimination

    TermAuthorisationFailureEthnicDiscrimination Prefix risk
    LabelAuthorisation FailureEthnic Discrimination
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailurehttps://w3id.org/dpv/risk#EthnicDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Racism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Racism + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Authorisation FailureDiscrimination against individuals based on their ethnicity or cultural heritage
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - @@ -3480,7 +10746,10 @@

    None

    - + + + + @@ -3490,14 +10759,17 @@

    None

    - + + + + - @@ -3505,44 +10777,46 @@

    None

    -
    -

    Availability Incident

    + + + + + + +
    +

    Exposure to Harmful Speech

    TermAvailabilityBreachExcellenceDiscrimination Prefix risk
    LabelNoneExcellence Discrimination
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreachhttps://w3id.org/dpv/risk#ExcellenceDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3551,28 +10825,40 @@

    Availability Incident

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -3581,48 +10867,40 @@

    Availability Incident

    -
    -

    Avoid Source

    + +
    +

    External Security Threat

    TermAvailabilityIncidentExposureToHarmfulSpeech Prefix risk
    LabelAvailability IncidentExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncidenthttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Incident + risk:SocietalRiskdpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affectedSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3631,7 +10909,7 @@

    Avoid Source

    - + @@ -3642,20 +10920,14 @@

    Avoid Source

    - - - - + - - - - + - @@ -3664,35 +10936,40 @@

    Avoid Source

    -
    -

    Benefit

    + + + + +
    +

    Extorsion

    TermAvoidSourceExternalSecurityThreat Prefix risk
    LabelAvoid SourceExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#AvoidSourcehttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSource
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk sourceConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -3706,20 +10983,23 @@

    Benefit

    - + - + + + + - + @@ -3727,13 +11007,13 @@

    Benefit

    - + - @@ -3742,39 +11022,44 @@

    Benefit

    -
    -

    Bias

    +
    +

    Extremely High Likelihood

    TermBenefitExtorsion Prefix risk
    LabelBenefitExtorsion
    IRIhttps://w3id.org/dpv/risk#Benefithttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:FinancialImpact + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes benefitsSomething that acts as or causes Extorsion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-03-232022-08-17
    Date Modified
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel PolleresHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -3783,80 +11068,80 @@

    Bias

    - + - + + + + - - - - + - + - + -
    TermBiasExtremelyHighLikelihood Prefix risk
    LabelBiasExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#Biashttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to othersLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in AI + section RISK-LEVELS in RISK
    - -
    -

    Blackmail

    +
    +

    Extremely High Risk

    - + - + - + - + - - - - + + + + @@ -3865,28 +11150,25 @@

    Blackmail

    - + - + + + + - - - - + - + - - - - + @@ -3895,7 +11177,7 @@

    Blackmail

    - @@ -3904,46 +11186,44 @@

    Blackmail

    -
    -

    Brute Force Authorisations

    +
    +

    Extremely High Severity

    TermBlackmailExtremelyHighRisk Prefix risk
    LabelBlackmailExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#Blackmailhttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes BlackmailLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - - + + + + @@ -3952,28 +11232,25 @@

    Brute Force Authorisations

    - + - + + + + - - - - + - + - - - - + @@ -3982,7 +11259,7 @@

    Brute Force Authorisations

    - @@ -3991,50 +11268,42 @@

    Brute Force Authorisations

    - - - - -
    -

    Change Consequence

    +
    +

    Extremely Low Likelihood

    TermBruteForceAuthorisationsExtremelyHighSeverity Prefix risk
    LabelBrute Force AuthorisationsExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisationshttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniquesLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -4045,9 +11314,12 @@

    Change Consequence

    - + - + + + + @@ -4058,7 +11330,7 @@

    Change Consequence

    - + @@ -4069,7 +11341,7 @@

    Change Consequence

    - @@ -4078,46 +11350,42 @@

    Change Consequence

    -
    -

    Change Impact

    +
    +

    Extremely Low Risk

    TermChangeConsequenceExtremelyLowLikelihood Prefix risk
    LabelChange ConsequenceExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#ChangeConsequencehttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasLikelihood
    DefinitionControl that changes ConsequenceLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -4128,9 +11396,12 @@

    Change Impact

    - + - + + + + @@ -4141,7 +11412,7 @@

    Change Impact

    - + @@ -4152,7 +11423,7 @@

    Change Impact

    - @@ -4161,43 +11432,44 @@

    Change Impact

    -
    -

    Coercion

    +
    +

    Extremely Low Severity

    TermChangeImpactExtremelyLowRisk Prefix risk
    LabelChange ImpactExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#ChangeImpacthttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionControl that changes ImpactLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - + + + + @@ -4206,28 +11478,25 @@

    Coercion

    - + - + + + + - - - - + - + - - - - + @@ -4236,7 +11505,7 @@

    Coercion

    - @@ -4245,36 +11514,38 @@

    Coercion

    -
    -

    Cognitive Bias

    + + + +
    +

    Financial Impact

    TermCoercionExtremelyLowSeverity Prefix risk
    LabelCoercionExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#Coercionhttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes CoercionLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -4287,34 +11558,25 @@

    Cognitive Bias

    - + - - - - + - - - - + - - - - + - @@ -4323,30 +11585,33 @@

    Cognitive Bias

    -
    -

    Compensation

    + + + +
    +

    Financial Loss

    TermCognitiveBiasFinancialImpact Prefix risk
    LabelCognitive BiasFinancial Impact
    IRIhttps://w3id.org/dpv/risk#CognitiveBiashttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when humans are processing and interpreting informationThings that cause or have the potential to impact financial resources
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in AI + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -4365,20 +11630,23 @@

    Compensation

    - + - + + + + - + @@ -4386,13 +11654,13 @@

    Compensation

    - + - @@ -4401,38 +11669,40 @@

    Compensation

    -
    -

    Component Failure

    + + + + +
    +

    Fraud

    TermCompensationFinancialLoss Prefix risk
    LabelCompensationFinancial Loss
    IRIhttps://w3id.org/dpv/risk#Compensationhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other formsSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-04-142022-08-17
    Date Modified
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -4446,28 +11716,37 @@

    Component Failure

    - + - - - - + - + + + + - - - + + + + + + + + + + + + - @@ -4476,38 +11755,45 @@

    Component Failure

    -
    -

    Component Malfunction

    + + + +
    +

    Gender Discrimination

    TermComponentFailureFraud Prefix risk
    LabelComponent FailureFraud
    IRIhttps://w3id.org/dpv/risk#ComponentFailurehttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Component FailureSomething that acts as or causes Fraud
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -4521,12 +11807,9 @@

    Component Malfunction

    - + - - - - + @@ -4535,14 +11818,17 @@

    Component Malfunction

    - + + + + - @@ -4551,44 +11837,43 @@

    Component Malfunction

    -
    -

    Compromise Account

    + + + +
    +

    Geographic Discrimination

    TermComponentMalfunctionGenderDiscrimination Prefix risk
    LabelComponent MalfunctionGender Discrimination
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunctionhttps://w3id.org/dpv/risk#GenderDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept + risk:Sexism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Component MalfunctionDiscrimination based on a person's gender identity or gender expression
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - @@ -4602,37 +11887,28 @@

    Compromise Account

    - + - - - - + - + - - - - - - - - + + - @@ -4641,39 +11917,40 @@

    Compromise Account

    -
    -

    Compromise Account Credentials

    + + + +
    +

    Group Attribution Bias

    TermCompromiseAccountGeographicDiscrimination Prefix risk
    LabelCompromise AccountGeographic Discrimination
    IRIhttps://w3id.org/dpv/risk#CompromiseAccounthttps://w3id.org/dpv/risk#GeographicDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiserDiscrimination based on a person's geographical origin or residence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -4686,7 +11963,7 @@

    Compromise Account Credentials

    - + @@ -4695,28 +11972,25 @@

    Compromise Account Credentials

    - + - + - - - - + - + - @@ -4725,69 +11999,48 @@

    Compromise Account Credentials

    -
    -

    Confidentiality Breach

    +
    +

    Halt Source

    TermCompromiseAccountCredentialsGroupAttributionBias Prefix risk
    LabelCompromise Account CredentialsGroup Attribution Bias
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentialshttps://w3id.org/dpv/risk#GroupAttributionBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Account Credentials to be compromisedBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - - - + + + + @@ -4796,28 +12049,22 @@

    Confidentiality Breach

    - + - - - - + - + - - - - + @@ -4826,7 +12073,7 @@

    Confidentiality Breach

    - @@ -4834,54 +12081,51 @@

    Confidentiality Breach

    -
    -

    Confidentiality Incident

    + + + + +
    +

    Harassment

    TermConfidentialityBreachHaltSource Prefix risk
    LabelConfidentiality BreachHalt Source
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreachhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Confidentiality BreachControl that halts the risk source or prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - - - - + @@ -4891,17 +12135,14 @@

    Confidentiality Incident

    - - - - + - @@ -4910,37 +12151,38 @@

    Confidentiality Incident

    -
    -

    Confirmation Bias

    + + + +
    +

    Harm

    TermConfidentialityIncidentHarassment Prefix risk
    LabelConfidentiality IncidentHarassment
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncidenthttps://w3id.org/dpv/risk#Harassment
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -4953,34 +12195,37 @@

    Confirmation Bias

    - + - + + + + - - - - + - + - + + + + - + - @@ -4989,42 +12234,62 @@

    Confirmation Bias

    -
    -

    Confounding Variables Bias

    + + + + + + + + + + +
    +

    High Likelihood

    TermConfirmationBiasHarm Prefix risk
    LabelConfirmation BiasHarm
    IRIhttps://w3id.org/dpv/risk#ConfirmationBiashttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:IndividualRisk
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of informationSomething that acts as or causes Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    Source
    Date Created2024-09-132022-08-13
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - + + + + @@ -5033,34 +12298,34 @@

    Confounding Variables Bias

    - + - + + + + - - - - + - + - + - @@ -5069,45 +12334,50 @@

    Confounding Variables Bias

    -
    -

    Consequence Control

    +
    +

    High Risk

    TermConfoundingVariablesBiasHighLikelihood Prefix risk
    LabelConfounding Variables BiasHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBiashttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious associationLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -5118,9 +12388,12 @@

    Consequence Control

    - + - + + + + @@ -5131,7 +12404,7 @@

    Consequence Control

    - + @@ -5142,7 +12415,7 @@

    Consequence Control

    - @@ -5151,45 +12424,50 @@

    Consequence Control

    -
    -

    Containment Control

    +
    +

    High Severity

    TermConsequenceControlHighRisk Prefix risk
    LabelConsequence ControlHigh Risk
    IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionRisk Mitigation Measure that controls the ConsequencesLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -5200,9 +12478,12 @@

    Containment Control

    - + - + + + + @@ -5213,15 +12494,18 @@

    Containment Control

    - + - + + + + - @@ -5230,35 +12514,45 @@

    Containment Control

    -
    -

    Copyright Violation

    + + + +
    +

    Homophobia

    TermContainmentControlHighSeverity Prefix risk
    LabelContainment ControlHigh Severity
    IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionControl to contain eventLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + @@ -5272,80 +12566,69 @@

    Copyright Violation

    - + - - - - + - + - - - - - - - - + + -
    TermCopyrightViolationHomophobia Prefix risk
    LabelCopyright ViolationHomophobia
    IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#Homophobia
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Copyright ViolationHostility or prejudice against individuals who are or are perceived to be homosexual
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - - -
    -

    Coverage Bias

    + + + +
    +

    Human Errors

    - + - + - + - + - @@ -5358,7 +12641,7 @@

    Coverage Bias

    - + @@ -5367,25 +12650,28 @@

    Coverage Bias

    - + - + - + + + + - + - @@ -5393,42 +12679,46 @@

    Coverage Bias

    -
    -

    Cross-Border Incident

    + +
    +

    Identification Control

    TermCoverageBiasHumanErrors Prefix risk
    LabelCoverage BiasHuman Errors
    IRIhttps://w3id.org/dpv/risk#CoverageBiashttps://w3id.org/dpv/risk#HumanErrors
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:UserRisks + → dpv:RiskConcept
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being usedSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -5439,7 +12729,7 @@

    Cross-Border Incident

    - + @@ -5460,7 +12750,7 @@

    Cross-Border Incident

    - @@ -5469,38 +12759,40 @@

    Cross-Border Incident

    -
    -

    Cryptojacking

    + + + + +
    +

    Identity Fraud

    TermCrossBorderIncidentIdentificationControl Prefix risk
    LabelCross-Border IncidentIdentification Control
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionIncident involving cross-border or multiple jurisdictionsControl to identify characteristics of event
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -5514,7 +12806,7 @@

    Cryptojacking

    - + @@ -5523,7 +12815,7 @@

    Cryptojacking

    - + @@ -5544,7 +12836,7 @@

    Cryptojacking

    - @@ -5553,35 +12845,40 @@

    Cryptojacking

    -
    -

    Damage

    + + + + +
    +

    Identity Theft

    TermCryptojackingIdentityFraud Prefix risk
    LabelCryptojackingIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes CryptojackingSomething that acts as or causes Identity Fraud
    SourceENISA Threat Landscape 2021ENISA Threat Taxonomy 2016
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -5595,20 +12892,23 @@

    Damage

    - + - + + + + - + @@ -5622,7 +12922,7 @@

    Damage

    - @@ -5631,37 +12931,38 @@

    Damage

    -
    -

    Data Aggregation Bias

    + + +
    +

    Illegal Data Processing

    TermDamageIdentityTheft Prefix risk
    LabelDamageIdentity Theft
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:LegalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes DamageSomething that acts as or causes Identity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2022-03-302022-08-17
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -5674,34 +12975,40 @@

    Data Aggregation Bias

    - + - + + + + - + - + - + + + + - + - @@ -5710,40 +13017,47 @@

    Data Aggregation Bias

    -
    -

    Data Bias

    +
    +

    Impact Control

    TermDataAggregationBiasIllegalDataProcessing Prefix risk
    LabelData Aggregation BiasIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#DataAggregationBiashttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:LegalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the dataSomething that acts as or causes Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -5752,34 +13066,31 @@

    Data Bias

    - + - - - - + - + - + - @@ -5788,49 +13099,40 @@

    Data Bias

    -
    -

    Data Breach

    + + + +
    +

    Implicit Bias

    TermDataBiasImpactControl Prefix risk
    LabelData BiasImpact Control
    IRIhttps://w3id.org/dpv/risk#DataBiashttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groupsRisk Mitigation Measure that controls Impacts
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - @@ -5843,40 +13145,34 @@

    Data Breach

    - + - - - - + - + - - - - + - + - @@ -5884,44 +13180,43 @@

    Data Breach

    - -
    -

    Data Corruption

    +
    +

    Incident

    TermDataBreachImplicitBias Prefix risk
    LabelData BreachImplicit Bias
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#ImplicitBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Data BreachBias that occurs when a human makes an association or assumption based on their mental models and memories
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - + + + + @@ -5930,26 +13225,26 @@

    Data Corruption

    - + - + + + + - - - - + - + @@ -5957,56 +13252,65 @@

    Data Corruption

    - + -
    TermDataCorruptionIncident Prefix risk
    LabelData CorruptionIncident
    IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes Corruption of DataAn actual or occured event
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0Incident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified
    ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section RISK-CONSEQUENCES in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + - -
    -

    Data Processing Bias

    +
    +

    Incident Assessment Report

    - + - + - + - + - - + + + + @@ -6015,34 +13319,28 @@

    Data Processing Bias

    - + - - - - + - + - - - - + - @@ -6050,42 +13348,45 @@

    Data Processing Bias

    -
    -

    Deliberate Incident

    + +
    +

    Incident Concluded

    TermDataProcessingBiasIncidentAssessmentReport Prefix risk
    LabelData Processing BiasIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#DataProcessingBiashttps://w3id.org/dpv/risk#IncidentAssessmentReport
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any biasA report describing the assessment of an incident in terms of its effects or impacts
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -6096,7 +13397,7 @@

    Deliberate Incident

    - + @@ -6109,15 +13410,18 @@

    Deliberate Incident

    - + - + + + + - @@ -6125,44 +13429,48 @@

    Deliberate Incident

    - -
    -

    Denial of Service Attack (DoS)

    +
    +

    Incident Concluding Report

    TermDeliberateIncidentIncidentConcluded Prefix risk
    LabelDeliberate IncidentIncident Concluded
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#IncidentConcluded
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation risk:hasIncident + dpv:hasContext, + dpv:hasStatus
    DefinitionIncident caused due to deliberate actions of a humanThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - + + + + @@ -6171,37 +13479,28 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + - - - - - - - - + + - @@ -6209,46 +13508,46 @@

    Denial of Service Attack (DoS)

    - -
    -

    Detection Control

    +
    +

    Incident Detection Report

    TermDenialServiceAttackIncidentConcludingReport Prefix risk
    LabelDenial of Service Attack (DoS)Incident Concluding Report
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -6259,7 +13558,7 @@

    Detection Control

    - + @@ -6280,7 +13579,7 @@

    Detection Control

    - @@ -6289,40 +13588,46 @@

    Detection Control

    -
    -

    Detriment

    +
    +

    Incident Halted

    TermDetectionControlIncidentDetectionReport Prefix risk
    LabelDetection ControlIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionControl to detect eventA report describing the detection of a Incident
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -6331,7 +13636,7 @@

    Detriment

    - + @@ -6344,21 +13649,18 @@

    Detriment

    - + - - - - + - + - @@ -6366,41 +13668,48 @@

    Detriment

    - -
    -

    Discrimination

    +
    +

    Incident Handling Report

    TermDetrimentIncidentHalted Prefix risk
    LabelDetrimentIncident Halted
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes DetrimentThe incident has halted or paused with a high likelihood of resuming or recurring
    Date Created2022-03-232024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -6409,7 +13718,7 @@

    Discrimination

    - + @@ -6422,21 +13731,15 @@

    Discrimination

    - + - - - - - - - - + + - @@ -6444,41 +13747,33 @@

    Discrimination

    - -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    Incident Identifier

    TermDiscriminationIncidentHandlingReport Prefix risk
    LabelDiscriminationIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#IncidentHandlingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes DiscriminationA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Date Created2022-08-192024-05-19
    Date Modified2024-08-16
    ContributorsGeorg P. Krog
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -6490,37 +13785,28 @@

    Distributed Denial of Service Attack (DDoS)

    - + - - - - + - + - - - - - - - - + + - @@ -6528,23 +13814,23 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Environmental Incident

    +
    +

    Incident Impact Assessment

    TermDistributedDenialServiceAttackIncidentIdentifier Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)Incident Identifier
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Identifier associated with an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + @@ -6556,14 +13842,21 @@

    Environmental Incident

    - - @@ -6574,7 +13867,7 @@

    Environmental Incident

    - + @@ -6590,7 +13883,10 @@

    Environmental Incident

    - + + + + @@ -6604,39 +13900,46 @@

    Environmental Incident

    -
    -

    Environmental Risk

    +
    +

    Incident Mitigated

    TermEnvironmentalIncidentIncidentImpactAssessment Prefix risk
    LabelEnvironmental IncidentIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Broader/Parent types risk:Incident - → dpv:RiskConcept + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncident caused due to environmental factors outside human controlsAn impact assessment associated with a incident
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - + + + + @@ -6645,7 +13948,7 @@

    Environmental Risk

    - + @@ -6656,14 +13959,20 @@

    Environmental Risk

    - + + + + - + + + + - @@ -6671,44 +13980,45 @@

    Environmental Risk

    - -
    -

    Equipment Failure

    +
    +

    Incident Mitigation Measure

    TermEnvironmentalRiskIncidentMitigated Prefix risk
    LabelEnvironmental RiskIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionRisks and issues that have their origin in environment or can affect the environment at largeThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - + + + + @@ -6717,40 +14027,28 @@

    Equipment Failure

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -6759,43 +14057,46 @@

    Equipment Failure

    -
    -

    Equipment Malfunction

    +
    +

    Incident Near Miss

    TermEquipmentFailureIncidentMitigationMeasure Prefix risk
    LabelEquipment FailureIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
    DefinitionSomething that acts as or causes Equipment FailureA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -6804,31 +14105,22 @@

    Equipment Malfunction

    - + - - - - + - - - - + - + - - - - + @@ -6837,7 +14129,7 @@

    Equipment Malfunction

    - @@ -6845,41 +14137,47 @@

    Equipment Malfunction

    - -
    -

    Erroneous System Use

    +
    +

    Incident Notice

    TermEquipmentMalfunctionIncidentNearMiss Prefix risk
    LabelEquipment MalfunctionIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Equipment MalfunctionThe state where an incident was almost successful in taking place i.e. "it came very close"
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -6888,37 +14186,28 @@

    Erroneous System Use

    - + - - - - + - + - - - - - - - - + + - @@ -6927,42 +14216,46 @@

    Erroneous System Use

    - - -
    -

    Exposure to Harmful Speech

    +
    +

    Incident Ongoing

    TermErroneousSystemUseIncidentNotice Prefix risk
    LabelErroneous System UseIncident Notice
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Erroneous System UseNotice associated with an Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -6971,31 +14264,22 @@

    Exposure to Harmful Speech

    - + - - - - + - - - - + - + - - - - + @@ -7004,7 +14288,7 @@

    Exposure to Harmful Speech

    - @@ -7012,40 +14296,48 @@

    Exposure to Harmful Speech

    - -
    -

    External Security Threat

    +
    +

    Incident Ongoing Report

    TermExposureToHarmfulSpeechIncidentOngoing Prefix risk
    LabelExposure to Harmful SpeechIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Harmful SpeechThe incident is ongoing i.e. still active
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -7054,7 +14346,7 @@

    External Security Threat

    - + @@ -7065,14 +14357,17 @@

    External Security Threat

    - + + + + - @@ -7080,44 +14375,48 @@

    External Security Threat

    - -
    -

    Extorsion

    +
    +

    Incident Preliminary Report

    TermExternalSecurityThreatIncidentOngoingReport Prefix risk
    LabelExternal Security ThreatIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionConcepts associated with security threats that are likely to originate externallyA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -7126,37 +14425,28 @@

    Extorsion

    - + - - - - + - + - - - - - - - - + + - @@ -7164,43 +14454,45 @@

    Extorsion

    - -
    -

    Extremely High Likelihood

    +
    +

    Incident Register

    TermExtorsionIncidentPreliminaryReport Prefix risk
    LabelExtorsionIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes ExtorsionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7211,12 +14503,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -7227,7 +14516,7 @@

    Extremely High Likelihood

    - + @@ -7238,7 +14527,7 @@

    Extremely High Likelihood

    - @@ -7246,43 +14535,45 @@

    Extremely High Likelihood

    - -
    -

    Extremely High Risk

    +
    +

    Incident Report

    TermExtremelyHighLikelihoodIncidentRegister Prefix risk
    LabelExtremely High LikelihoodIncident Register
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Likelihood is Extremely HighA register recording incidentes, their reports, notifications, and other related activities
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7293,12 +14584,9 @@

    Extremely High Risk

    - + - - - - + @@ -7309,18 +14597,15 @@

    Extremely High Risk

    - + - - - - + - @@ -7328,43 +14613,43 @@

    Extremely High Risk

    - -
    -

    Extremely High Severity

    +
    +

    Incident Status

    TermExtremelyHighRiskIncidentReport Prefix risk
    LabelExtremely High RiskIncident Report
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#IncidentReport
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasRiskLevel + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Risk is Extremely HighDocumented information about an incident, its handling, assessments,and notifications
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7375,13 +14660,13 @@

    Extremely High Severity

    - + - - - - + + + + @@ -7391,7 +14676,7 @@

    Extremely High Severity

    - + @@ -7402,7 +14687,7 @@

    Extremely High Severity

    - @@ -7411,42 +14696,44 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    +
    +

    Incident Status Unknown

    TermExtremelyHighSeverityIncidentStatus Prefix risk
    LabelExtremely High SeverityIncident Status
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#IncidentStatus
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:Status + → dpv:Context
    Object of relation dpv:hasSeverity + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Severity is Extremely HighStatus associated with an incident
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in DEX
    - + - + - + - + - - @@ -7457,12 +14744,9 @@

    Extremely Low Likelihood

    - + - - - - + @@ -7473,7 +14757,7 @@

    Extremely Low Likelihood

    - + @@ -7484,7 +14768,7 @@

    Extremely Low Likelihood

    - @@ -7493,42 +14777,44 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    +
    +

    Incident Suspected

    TermExtremelyLowLikelihoodIncidentStatusUnknown Prefix risk
    LabelExtremely Low LikelihoodIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#IncidentStatusUnknown
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasLikelihood + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Likelihood is Extremely LowThe status of a incident is unknown
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -7539,12 +14825,9 @@

    Extremely Low Risk

    - + - - - - + @@ -7555,7 +14838,7 @@

    Extremely Low Risk

    - + @@ -7566,7 +14849,7 @@

    Extremely Low Risk

    - @@ -7574,43 +14857,46 @@

    Extremely Low Risk

    - -
    -

    Extremely Low Severity

    +
    +

    Incident Suspected Report

    TermExtremelyLowRiskIncidentSuspected Prefix risk
    LabelExtremely Low RiskIncident Suspected
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasRiskLevel + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Risk is Extremely LowThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -7621,12 +14907,9 @@

    Extremely Low Severity

    - + - - - - + @@ -7637,18 +14920,15 @@

    Extremely Low Severity

    - + - - - - + - @@ -7657,40 +14937,46 @@

    Extremely Low Severity

    -
    -

    Fee

    +
    +

    Incident Terminated

    TermExtremelyLowSeverityIncidentSuspectedReport Prefix risk
    LabelExtremely Low SeverityIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#IncidentSuspectedReport
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Severity is Extremely LowA report describing the suspicion of an incident in the past or occuring
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -7699,37 +14985,31 @@

    Fee

    - + - - - - + - + - - - - + - + - @@ -7738,35 +15018,44 @@

    Fee

    -
    -

    Financial Impact

    + + + +
    +

    Indirect Discrimination

    TermFeeIncidentTerminated Prefix risk
    LabelFeeIncident Terminated
    IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#IncidentTerminated
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or provides fees e.g. for using a serviceThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    Source
    Date Created2024-04-142024-02-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - + + @@ -7779,7 +15068,7 @@

    Financial Impact

    - + @@ -7790,14 +15079,17 @@

    Financial Impact

    - + + + + - @@ -7806,36 +15098,38 @@

    Financial Impact

    -
    -

    Financial Loss

    + + + +
    +

    Individual Health & Safety

    TermFinancialImpactIndirectDiscrimination Prefix risk
    LabelFinancial ImpactIndirect Discrimination
    IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#IndirectDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionThings that cause or have the potential to impact financial resourcesOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7846,39 +15140,24 @@

    Financial Loss

    - - - - + - - - - + - - - - - - - - - - - - + + + - @@ -7887,40 +15166,35 @@

    Financial Loss

    -
    -

    Fraud

    + + +
    +

    Individual Risk

    TermFinancialLossIndividualHealthSafety Prefix risk
    LabelFinancial LossIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IndividualRisk
    DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -7932,37 +15206,25 @@

    Fraud

    - + - - - - + - - - - - - - - - - - - + + + - @@ -7971,37 +15233,38 @@

    Fraud

    -
    -

    Group Attribution Bias

    + + + +
    +

    Informativeness Bias

    TermFraudIndividualRisk Prefix risk
    LabelFraudIndividual Risk
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes FraudRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8014,7 +15277,7 @@

    Group Attribution Bias

    - + @@ -8035,13 +15298,13 @@

    Group Attribution Bias

    - + - @@ -8050,48 +15313,44 @@

    Group Attribution Bias

    -
    -

    Halt Source

    + + + +
    +

    In-Group Bias

    TermGroupAttributionBiasInformativenessBias Prefix risk
    LabelGroup Attribution BiasInformativeness Bias
    IRIhttps://w3id.org/dpv/risk#GroupAttributionBiashttps://w3id.org/dpv/risk#InformativenessBias
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:EngineeringDecisionBias
    DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that groupBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8100,31 +15359,34 @@

    Halt Source

    - + - + + + + - + - + - @@ -8133,35 +15395,39 @@

    Halt Source

    -
    -

    Harm

    + + + +
    +

    Injury

    TermHaltSourceInGroupBias Prefix risk
    LabelHalt SourceIn-Group Bias
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#InGroupBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialisingBias that occurs when showing partiality to one's own group or own characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8174,23 +15440,23 @@

    Harm

    - + - - - - + - + + + + - + @@ -8204,7 +15470,7 @@

    Harm

    - @@ -8217,72 +15483,50 @@

    Harm

    - - - - - - -
    -

    High Likelihood

    +
    +

    None

    TermHarmInjury Prefix risk
    LabelHarmInjury
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Harm to humansSomething that acts as or causes Injury
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceISO/IEC 27005:2018
    Date Created2022-08-132022-08-17
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + - - - - - - - - + + @@ -8291,20 +15535,14 @@

    High Likelihood

    - - - - + - - - - + - @@ -8312,53 +15550,39 @@

    High Likelihood

    - -
    -

    High Risk

    +
    +

    Integrity Concept

    TermHighLikelihoodIntegrityBreach Prefix risk
    LabelHigh LikelihoodNone
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -8367,11 +15591,11 @@

    High Risk

    - + - + @@ -8383,7 +15607,7 @@

    High Risk

    - + @@ -8394,7 +15618,7 @@

    High Risk

    - @@ -8402,51 +15626,42 @@

    High Risk

    - -
    -

    High Severity

    +
    +

    Integrity Incident

    TermHighRiskIntegrityConcept Prefix risk
    LabelHigh RiskIntegrity Concept
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IntegrityConcept
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2022-08-182024-09-29
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - @@ -8457,12 +15672,9 @@

    High Severity

    - + - - - - + @@ -8473,18 +15685,15 @@

    High Severity

    - + - - - - + - @@ -8493,35 +15702,39 @@

    High Severity

    -
    -

    Human Errors

    + + + +
    +

    Intentional Misuse

    TermHighSeverityIntegrityIncident Prefix risk
    LabelHigh SeverityIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IntegrityIncident
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasSeverity + risk:hasIncident
    DefinitionLevel where Severity is HighIncident where the integrity of information or system has been affected
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - @@ -8535,37 +15748,25 @@

    Human Errors

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8574,47 +15775,45 @@

    Human Errors

    -
    -

    Identification Control

    + + + + +
    +

    Intercept Communications

    TermHumanErrorsIntentionalMisuse Prefix risk
    LabelHuman ErrorsIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UserRisks + risk:Misuse + → risk:UserRisksdpv:RiskConcept
    DefinitionSomething that acts as or causes Human ErrorsIntentional Misuse
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8623,28 +15822,40 @@

    Identification Control

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -8653,38 +15864,43 @@

    Identification Control

    -
    -

    Identity Fraud

    + + + + + + + +
    +

    Judicial Costs

    TermIdentificationControlInterceptCommunications Prefix risk
    LabelIdentification ControlIntercept Communications
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to identify characteristics of eventSomething that acts as or causes Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -8698,37 +15914,25 @@

    Identity Fraud

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8737,38 +15941,39 @@

    Identity Fraud

    -
    -

    Identity Theft

    + + + +
    +

    Judicial Penalty

    TermIdentityFraudJudicialCosts Prefix risk
    LabelIdentity FraudJudicial Costs
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialLoss + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that acts as or causes Identity FraudSomething that involves or causes judicial costs to be paid
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -8782,37 +15987,25 @@

    Identity Theft

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8821,35 +16014,43 @@

    Identity Theft

    -
    -

    Illegal Data Processing

    + + + +
    +

    Language Discrimination

    TermIdentityTheftJudicialPenalty Prefix risk
    LabelIdentity TheftJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialLoss + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that acts as or causes Identity TheftSomething that involves or causes judicial penalties to be paid
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -8863,40 +16064,28 @@

    Illegal Data Processing

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -8905,47 +16094,41 @@

    Illegal Data Processing

    -
    -

    Impact Control

    + + +
    +

    Legal Risk

    TermIllegalDataProcessingLanguageDiscrimination Prefix risk
    LabelIllegal Data ProcessingLanguage Discrimination
    IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#LanguageDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Illegal Processing of DataDiscrimination based on a person's language, often linked to national origin or ethnicity
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8954,7 +16137,7 @@

    Impact Control

    - + @@ -8965,20 +16148,14 @@

    Impact Control

    - - - - + - - - - + - @@ -8987,37 +16164,39 @@

    Impact Control

    -
    -

    Implicit Bias

    + + + +
    +

    Lose of Credibility

    TermImpactControlLegalRisk Prefix risk
    LabelImpact ControlLegal Risk
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#LegalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls ImpactsRisks and issues that have their basis in legal requirements and enforcement
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9030,7 +16209,7 @@

    Implicit Bias

    - + @@ -9039,25 +16218,28 @@

    Implicit Bias

    - + - + - + + + + - + - @@ -9065,43 +16247,44 @@

    Implicit Bias

    -
    -

    Incident

    + + + + +
    +

    Lose of Customer Confidence

    TermImplicitBiasLoseCredibility Prefix risk
    LabelImplicit BiasLose of Credibility
    IRIhttps://w3id.org/dpv/risk#ImplicitBiashttps://w3id.org/dpv/risk#LoseCredibility
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ReputationalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when a human makes an association or assumption based on their mental models and memoriesSomething that acts as or causes Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9110,26 +16293,23 @@

    Incident

    - + - - - - - - - + - + + + + - + @@ -9137,65 +16317,58 @@

    Incident

    - + -
    TermIncidentLoseCustomerConfidence Prefix risk
    LabelIncidentLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionAn actual or occured eventSomething that acts as or causes Loss of Customer Confidence
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
    See More: section CORE in DEX - , section INCIDENT in DEX + section RISK-TAXONOMY in RISK
    - - -
    -

    Incident Assessment Report

    + + + + +
    +

    Lose of Goodwill

    - + - + - + - + - - - - - + @@ -9204,28 +16377,37 @@

    Incident Assessment Report

    - + - + + + + - + - - + + + + + + + + - @@ -9234,46 +16416,43 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    + + + +
    +

    Lose of Negotiating Capacity

    TermIncidentAssessmentReportLoseGoodwill Prefix risk
    LabelIncident Assessment ReportLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsSomething that acts as or causes Loss of Goodwill
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9282,22 +16461,28 @@

    Incident Concluded

    - + - + + + + - + - + + + + @@ -9306,7 +16491,7 @@

    Incident Concluded

    - @@ -9314,48 +16499,44 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + + + + +
    +

    Lose of Opportunity

    TermIncidentConcludedLoseNegotiatingCapacity Prefix risk
    LabelIncident ConcludedLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringSomething that acts as or causes Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9364,28 +16545,37 @@

    Incident Concluding Report

    - + - + + + + - + - - + + + + + + + + - @@ -9393,48 +16583,44 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    + + + + +
    +

    Lose of Reputation

    TermIncidentConcludingReportLoseOpportunity Prefix risk
    LabelIncident Concluding ReportLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#LoseOpportunity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownSomething that acts as or causes Loss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9443,28 +16629,37 @@

    Incident Detection Report

    - + - + + + + - + - - + + + + + + + + - @@ -9473,46 +16668,43 @@

    Incident Detection Report

    -
    -

    Incident Halted

    + + + +
    +

    Lose of Trust

    TermIncidentDetectionReportLoseReputation Prefix risk
    LabelIncident Detection ReportLose of Reputation
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the detection of a IncidentSomething that acts as or causes Loss of Reputation
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9521,22 +16713,28 @@

    Incident Halted

    - + - + + + + - + - + + + + @@ -9545,7 +16743,7 @@

    Incident Halted

    - @@ -9553,46 +16751,51 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + +
    +

    Low Likelihood

    TermIncidentHaltedLoseTrust Prefix risk
    LabelIncident HaltedLose of Trust
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringSomething that acts as or causes Loss of Trust
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -9603,9 +16806,12 @@

    Incident Handling Report

    - + - + + + + @@ -9616,15 +16822,18 @@

    Incident Handling Report

    - + - + + + + - @@ -9632,36 +16841,53 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + +
    +

    Low Risk

    TermIncidentHandlingReportLowLikelihood Prefix risk
    LabelIncident Handling ReportLow Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasLikelihood
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + + + + - + + + + @@ -9670,9 +16896,12 @@

    Incident Identifier

    - + - + + + + @@ -9683,15 +16912,18 @@

    Incident Identifier

    - + - + + + + - @@ -9699,49 +16931,51 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + +
    +

    Low Severity

    TermIncidentIdentifierLowRisk Prefix risk
    LabelIncident IdentifierLow Risk
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionIdentifier associated with an incidentLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -9752,9 +16986,12 @@

    Incident Impact Assessment

    - + - + + + + @@ -9765,7 +17002,7 @@

    Incident Impact Assessment

    - + @@ -9776,7 +17013,7 @@

    Incident Impact Assessment

    - @@ -9785,46 +17022,43 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    + + + +
    +

    Malicious Activity

    TermIncidentImpactAssessmentLowSeverity Prefix risk
    LabelIncident Impact AssessmentLow Severity
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionAn impact assessment associated with a incidentLevel where Severity is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -9833,7 +17067,7 @@

    Incident Mitigated

    - + @@ -9844,20 +17078,14 @@

    Incident Mitigated

    - - - - + - - - - + - @@ -9865,45 +17093,47 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + + + + + + +
    +

    Malicious Code Attack

    TermIncidentMitigatedMaliciousActivity Prefix risk
    LabelIncident MitigatedMalicious Activity
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#MaliciousActivity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9912,28 +17142,37 @@

    Incident Mitigation Measure

    - + - + + + + - + - - + + + + + + + + - @@ -9942,46 +17181,46 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + + + +
    +

    Malware Attack

    TermIncidentMitigationMeasureMaliciousCodeAttack Prefix risk
    LabelIncident Mitigation MeasureMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againSomething that acts as or causes Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9990,22 +17229,28 @@

    Incident Near Miss

    - + - + + + + - + - + + + + @@ -10014,7 +17259,7 @@

    Incident Near Miss

    - @@ -10022,47 +17267,44 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + + + + +
    +

    Material Damage

    TermIncidentNearMissMalwareAttack Prefix risk
    LabelIncident Near MissMalware Attack
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Something that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - + + + @@ -10071,9 +17313,12 @@

    Incident Notice

    - + - + + + + @@ -10084,15 +17329,21 @@

    Incident Notice

    - + - - + + + + + + + + - @@ -10101,46 +17352,50 @@

    Incident Notice

    -
    -

    Incident Ongoing

    + + + +
    +

    Misandry

    TermIncidentNoticeMaterialDamage Prefix risk
    LabelIncident NoticeMaterial Damage
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#MaterialDamage
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an IncidentSomething that acts as or causes Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -10149,7 +17404,7 @@

    Incident Ongoing

    - + @@ -10162,18 +17417,15 @@

    Incident Ongoing

    - + - - - - + - @@ -10181,48 +17433,51 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    + + + + +
    +

    Misogyny

    TermIncidentOngoingMisandry Prefix risk
    LabelIncident OngoingMisandry
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#Misandry
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident is ongoing i.e. still activeDislike, contempt, or prejudice against men
    Date Created2024-02-142024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -10231,7 +17486,7 @@

    Incident Ongoing Report

    - + @@ -10244,7 +17499,7 @@

    Incident Ongoing Report

    - + @@ -10252,7 +17507,7 @@

    Incident Ongoing Report

    - @@ -10260,48 +17515,44 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + + + + +
    +

    Misuse

    TermIncidentOngoingReportMisogyny Prefix risk
    LabelIncident Ongoing ReportMisogyny
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#Misogyny
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedDislike, contempt, or prejudice against women
    Date Created2024-05-192024-09-30
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -10310,7 +17561,7 @@

    Incident Preliminary Report

    - + @@ -10323,15 +17574,21 @@

    Incident Preliminary Report

    - + - - + + + + + + + + - @@ -10339,45 +17596,51 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + +
    +

    Moderate Likelihood

    TermIncidentPreliminaryReportMisuse Prefix risk
    LabelIncident Preliminary ReportMisuse
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownSomething that acts as or causes Misuse
    Date Created2024-05-192024-06-11
    Date Modified2024-08-16
    ContributorsDelaram Golpayegani
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -10388,9 +17651,12 @@

    Incident Register

    - + - + + + + @@ -10401,7 +17667,7 @@

    Incident Register

    - + @@ -10412,7 +17678,7 @@

    Incident Register

    - @@ -10420,45 +17686,51 @@

    Incident Register

    -
    -

    Incident Report

    + +
    +

    Moderate Risk

    TermIncidentRegisterModerateLikelihood Prefix risk
    LabelIncident RegisterModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasLikelihood
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -10469,9 +17741,12 @@

    Incident Report

    - + - + + + + @@ -10482,15 +17757,18 @@

    Incident Report

    - + - + + + + - @@ -10498,43 +17776,51 @@

    Incident Report

    -
    -

    Incident Status

    + +
    +

    Moderate Severity

    TermIncidentReportModerateRisk Prefix risk
    LabelIncident ReportModerate Risk
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -10545,13 +17831,13 @@

    Incident Status

    - + + + + + - - - - @@ -10561,7 +17847,7 @@

    Incident Status

    - + @@ -10572,7 +17858,7 @@

    Incident Status

    - @@ -10581,44 +17867,46 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Monitor Consequence

    TermIncidentStatusModerateSeverity Prefix risk
    LabelIncident StatusModerate Severity
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Status - → dpv:Context + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasSeverity
    DefinitionStatus associated with an incidentLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in DEX + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -10629,7 +17917,7 @@

    Incident Status Unknown

    - + @@ -10642,7 +17930,7 @@

    Incident Status Unknown

    - + @@ -10653,7 +17941,7 @@

    Incident Status Unknown

    - @@ -10662,44 +17950,45 @@

    Incident Status Unknown

    -
    -

    Incident Suspected

    +
    +

    Monitor Control

    TermIncidentStatusUnknownMonitorConsequence Prefix risk
    LabelIncident Status UnknownMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe status of a incident is unknownControl that monitors a Risk Consequence
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10710,9 +17999,12 @@

    Incident Suspected

    - + - + + + + @@ -10723,7 +18015,7 @@

    Incident Suspected

    - + @@ -10734,7 +18026,7 @@

    Incident Suspected

    - @@ -10742,46 +18034,47 @@

    Incident Suspected

    -
    -

    Incident Suspected Report

    + +
    +

    Monitor Impact

    TermIncidentSuspectedMonitorControl Prefix risk
    LabelIncident SuspectedMonitor Control
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10792,7 +18085,7 @@

    Incident Suspected Report

    - + @@ -10808,12 +18101,15 @@

    Incident Suspected Report

    - + + + + - @@ -10822,44 +18118,46 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    +
    +

    Monitor Risk

    TermIncidentSuspectedReportMonitorImpact Prefix risk
    LabelIncident Suspected ReportMonitor Impact
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA report describing the suspicion of an incident in the past or occuringControl that monitors a Risk Impact
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10870,7 +18168,7 @@

    Incident Terminated

    - + @@ -10883,7 +18181,7 @@

    Incident Terminated

    - + @@ -10894,7 +18192,7 @@

    Incident Terminated

    - @@ -10903,46 +18201,58 @@

    Incident Terminated

    -
    -

    Individual Health & Safety

    +
    +

    Monitor Control

    TermIncidentTerminatedMonitorRisk Prefix risk
    LabelIncident TerminatedMonitor Risk
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringControl that monitors a Risk
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + - + + + + @@ -10952,14 +18262,20 @@

    Individual Health & Safety

    - + + + + - + + + + - @@ -10967,36 +18283,49 @@

    Individual Health & Safety

    -
    -

    Individual Risk

    + +
    +

    Monitor Risk Source

    TermIndividualHealthSafetyMonitorRiskControl Prefix risk
    LabelIndividual Health & SafetyMonitor Control
    IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IndividualRisk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that monitors another Control
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + + - + + + + @@ -11005,7 +18334,7 @@

    Individual Risk

    - + @@ -11016,14 +18345,20 @@

    Individual Risk

    - + + + + - + + + + - @@ -11032,39 +18367,48 @@

    Individual Risk

    -
    -

    Informativeness Bias

    +
    +

    Monitor Vulnerabilities

    TermIndividualRiskMonitorRiskSource Prefix risk
    LabelIndividual RiskMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionRisks and issues that affect or have the potential to affect specific individualsControl that monitors a Risk Source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -11073,34 +18417,31 @@

    Informativeness Bias

    - + - - - - + - + - + - @@ -11109,37 +18450,44 @@

    Informativeness Bias

    -
    -

    In-Group Bias

    + + + +
    +

    Nationality Discrimination

    TermInformativenessBiasMonitorVulnerabilities Prefix risk
    LabelInformativeness BiasMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#InformativenessBiashttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:EngineeringDecisionBias + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some groupControl that monitors a Risk Vulnerability
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + @@ -11152,34 +18500,28 @@

    In-Group Bias

    - + - - - - + - + - - - - + - @@ -11188,35 +18530,39 @@

    In-Group Bias

    -
    -

    Injury

    + + + +
    +

    Non-Material Damage

    TermInGroupBiasNationalityDiscrimination Prefix risk
    LabelIn-Group BiasNationality Discrimination
    IRIhttps://w3id.org/dpv/risk#InGroupBiashttps://w3id.org/dpv/risk#NationalityDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias + Broader/Parent types risk:Discriminationrisk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when showing partiality to one's own group or own characteristicsDiscrimination based on a person's nationality or citizenship
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11229,23 +18575,23 @@

    Injury

    - + - + + + + - - - - + - + @@ -11259,7 +18605,7 @@

    Injury

    - @@ -11268,65 +18614,41 @@

    Injury

    -
    -

    None

    + + + +
    +

    Non-Normality Bias

    TermInjuryNonMaterialDamage Prefix risk
    LabelInjuryNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:LegalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes InjurySomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - - @@ -11337,24 +18659,36 @@

    None

    - + + + + - + + + + - + + + + - + + + + - @@ -11362,44 +18696,47 @@

    None

    -
    -

    Integrity Incident

    + + + + +
    +

    Non-Response Bias

    TermIntegrityBreachNonNormalityBias Prefix risk
    LabelNoneNon-Normality Bias
    IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#NonNormalityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11408,28 +18745,34 @@

    Integrity Incident

    - + - + + + + - + - + + + + - @@ -11438,36 +18781,37 @@

    Integrity Incident

    -
    -

    Intentional Misuse

    + + +
    +

    Operational Security Risk

    TermIntegrityIncidentNonResponseBias Prefix risk
    LabelIntegrity IncidentNon-Response Bias
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#NonResponseBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the integrity of information or system has been affectedBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11480,7 +18824,7 @@

    Intentional Misuse

    - + @@ -11498,7 +18842,7 @@

    Intentional Misuse

    - @@ -11507,39 +18851,40 @@

    Intentional Misuse

    -
    -

    Intercept Communications

    + + + +
    +

    Out-Group Homogeneity Bias

    TermIntentionalMisuseOperationalSecurityRisk Prefix risk
    LabelIntentional MisuseOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionIntentional MisuseRisks and issues that arise during operational processes
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -11552,40 +18897,34 @@

    Intercept Communications

    - + - - - - + - + - + - - - - + - + - @@ -11597,36 +18936,36 @@

    Intercept Communications

    - -
    -

    Judicial Costs

    +
    +

    Payment

    TermInterceptCommunicationsOutGroupHomogeneityBias Prefix risk
    LabelIntercept CommunicationsOut-Group Homogeneity Bias
    IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Interception of CommunicationsBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11640,7 +18979,7 @@

    Judicial Costs

    - + @@ -11651,14 +18990,23 @@

    Judicial Costs

    - - - + + + + + + + + + + + + - @@ -11667,35 +19015,38 @@

    Judicial Costs

    -
    -

    Judicial Penalty

    + + + +
    +

    Personal Safety Endangerment

    TermJudicialCostsPayment Prefix risk
    LabelJudicial CostsPayment
    IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:Renumeration + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that involves or causes judicial costs to be paidSomething that acts as or provides payment e.g. to access a service or purchase resources
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11709,25 +19060,37 @@

    Judicial Penalty

    - + - - - - + + + + - + + + + + + + + + + + + + - @@ -11736,35 +19099,41 @@

    Judicial Penalty

    -
    -

    Legal Risk

    + + + + +
    +

    Phishing Scam

    TermJudicialPenaltyPersonalSafetyEndangerment Prefix risk
    LabelJudicial PenaltyPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that involves or causes judicial penalties to be paidSomething that acts as or causes Personal Safety Endangerment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11777,25 +19146,37 @@

    Legal Risk

    - + - + + + + - - - + + + + + + + + + + + + - @@ -11804,36 +19185,39 @@

    Legal Risk

    -
    -

    Lose of Credibility

    + + + +
    +

    Physical Assault

    TermLegalRiskPhishingScam Prefix risk
    LabelLegal RiskPhishing Scam
    IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionRisks and issues that have their basis in legal requirements and enforcementSomething that acts as or causes Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11846,7 +19230,7 @@

    Lose of Credibility

    - + @@ -11876,7 +19260,7 @@

    Lose of Credibility

    - @@ -11885,36 +19269,39 @@

    Lose of Credibility

    -
    -

    Lose of Customer Confidence

    + + + +
    +

    Physical Harm

    TermLoseCredibilityPhysicalAssault Prefix risk
    LabelLose of CredibilityPhysical Assault
    IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of CredibilitySomething that acts as or causes Physical Assault
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11925,39 +19312,24 @@

    Lose of Customer Confidence

    - - - - + - - - - + - - - - - - - - - - - - + + + - @@ -11965,37 +19337,35 @@

    Lose of Customer Confidence

    - -
    -

    Lose of Goodwill

    +
    +

    Potential Consequence

    TermLoseCustomerConfidencePhysicalHarm Prefix risk
    LabelLose of Customer ConfidencePhysical Harm
    IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -12008,28 +19378,25 @@

    Lose of Goodwill

    - + - + + + + - - - - + - + - - - - + @@ -12038,7 +19405,7 @@

    Lose of Goodwill

    - @@ -12046,37 +19413,35 @@

    Lose of Goodwill

    - -
    -

    Lose of Negotiating Capacity

    +
    +

    Potential Impact

    TermLoseGoodwillPotentialConsequence Prefix risk
    LabelLose of GoodwillPotential Consequence
    IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#PotentialConsequence
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of GoodwillIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12089,28 +19454,25 @@

    Lose of Negotiating Capacity

    - + - + + + + - - - - + - + - - - - + @@ -12119,7 +19481,7 @@

    Lose of Negotiating Capacity

    - @@ -12127,37 +19489,35 @@

    Lose of Negotiating Capacity

    - -
    -

    Lose of Opportunity

    +
    +

    Potential Risk

    TermLoseNegotiatingCapacityPotentialImpact Prefix risk
    LabelLose of Negotiating CapacityPotential Impact
    IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#PotentialImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Negotiating CapacityIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12170,28 +19530,25 @@

    Lose of Opportunity

    - + - + + + + - - - - + - + - - - - + @@ -12200,7 +19557,7 @@

    Lose of Opportunity

    - @@ -12208,37 +19565,35 @@

    Lose of Opportunity

    - -
    -

    Lose of Reputation

    +
    +

    Potential RiskSource

    TermLoseOpportunityPotentialRisk Prefix risk
    LabelLose of OpportunityPotential Risk
    IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#PotentialRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of OpportunityIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12251,28 +19606,25 @@

    Lose of Reputation

    - + - + + + + - - - - + - + - - - - + @@ -12281,7 +19633,7 @@

    Lose of Reputation

    - @@ -12290,36 +19642,38 @@

    Lose of Reputation

    -
    -

    Lose of Trust

    + + + +
    +

    Privacy

    TermLoseReputationPotentialRiskSource Prefix risk
    LabelLose of ReputationPotential RiskSource
    IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#PotentialRiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of ReputationIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12330,39 +19684,24 @@

    Lose of Trust

    - - - - + - - - - + - - - - - - - - - - - - - + + + + - @@ -12371,52 +19710,43 @@

    Lose of Trust

    -
    -

    Low Likelihood

    + + + +
    +

    Psychological Harm

    TermLoseTrustPrivacy Prefix risk
    LabelLose of TrustPrivacy
    IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#Privacy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of Trust
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -12425,25 +19755,28 @@

    Low Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -12452,7 +19785,7 @@

    Low Likelihood

    - @@ -12461,52 +19794,42 @@

    Low Likelihood

    -
    -

    Low Risk

    + + +
    +

    Public Order Breach

    TermLowLikelihoodPsychologicalHarm Prefix risk
    LabelLow LikelihoodPsychological Harm
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#PsychologicalHarm
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:Harm + → risk:IndividualRisk
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is LowSomething that acts as or causes Psychological Harm
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -12515,25 +19838,28 @@

    Low Risk

    - + - - - - + - + + + + - + - + + + + @@ -12542,7 +19868,7 @@

    Low Risk

    - @@ -12551,52 +19877,50 @@

    Low Risk

    -
    -

    Low Severity

    + + + +
    +

    Racial Discrimination

    TermLowRiskPublicOrderBreach Prefix risk
    LabelLow RiskPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is LowSomething that acts as or causes Public Order Breach
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + @@ -12605,12 +19929,9 @@

    Low Severity

    - + - - - - + @@ -12621,18 +19942,15 @@

    Low Severity

    - + - - - - + - @@ -12641,45 +19959,44 @@

    Low Severity

    -
    -

    Malicious Code Attack

    + + + +
    +

    Racism

    TermLowSeverityRacialDiscrimination Prefix risk
    LabelLow SeverityRacial Discrimination
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#RacialDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:Racism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Racism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is LowDiscrimination against individuals because of their racial background or skin color
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - @@ -12692,37 +20009,28 @@

    Malicious Code Attack

    - + - - - - + - + - - - - - - - - + + - @@ -12731,49 +20039,47 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    +
    +

    Recovery Control

    TermMaliciousCodeAttackRacism Prefix risk
    LabelMalicious Code AttackRacism
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#Racism
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:ExternalSecurityThreat + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes Malicious Code AttackPrejudice or discrimination against people based on their race
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + + + + @@ -12782,37 +20088,28 @@

    Malware Attack

    - + - - - - + - + - - - - - - - - + + - @@ -12821,40 +20118,48 @@

    Malware Attack

    -
    -

    Material Damage

    +
    +

    Reduce Likelihood

    TermMalwareAttackRecoveryControl Prefix risk
    LabelMalware AttackRecovery Control
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#RecoveryControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malware AttackControl to recover from event
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -12863,12 +20168,9 @@

    Material Damage

    - + - - - - + @@ -12879,12 +20181,9 @@

    Material Damage

    - + - - - - + @@ -12893,7 +20192,7 @@

    Material Damage

    - @@ -12902,40 +20201,48 @@

    Material Damage

    -
    -

    Misuse

    +
    +

    Reduce Severity

    TermMaterialDamageReduceLikelihood Prefix risk
    LabelMaterial DamageReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Material DamageControl that reduces the likelihood of an event
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -12944,7 +20251,7 @@

    Misuse

    - + @@ -12957,21 +20264,18 @@

    Misuse

    - + - - - - + - + - @@ -12980,50 +20284,45 @@

    Misuse

    -
    -

    Moderate Likelihood

    +
    +

    Reduction Control

    TermMisuseReduceSeverity Prefix risk
    LabelMisuseReduce Severity
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#ReduceSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes MisuseControl that reduces the severity of an event
    Date Created2024-06-112024-05-19
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -13034,12 +20333,9 @@

    Moderate Likelihood

    - + - - - - + @@ -13050,18 +20346,15 @@

    Moderate Likelihood

    - + - - - - + - @@ -13070,52 +20363,46 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    + + + + + + +
    +

    Re-identification

    TermModerateLikelihoodReductionControl Prefix risk
    LabelModerate LikelihoodReduction Control
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#ReductionControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is ModerateControl that reduces the likelihood or severity of an event
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + @@ -13124,11 +20411,11 @@

    Moderate Risk

    - + - + @@ -13140,9 +20427,12 @@

    Moderate Risk

    - + - + + + + @@ -13151,7 +20441,7 @@

    Moderate Risk

    - @@ -13160,52 +20450,48 @@

    Moderate Risk

    -
    -

    Moderate Severity

    + + + +
    +

    Religious Discrimination

    TermModerateRiskReidentification Prefix risk
    LabelModerate RiskRe-identification
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateSomething that acts as or causes Re-identification
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-182022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + @@ -13214,12 +20500,9 @@

    Moderate Severity

    - + - - - - + @@ -13230,18 +20513,15 @@

    Moderate Severity

    - + - - - - + - @@ -13250,23 +20530,23 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    +
    +

    Remedy Control

    TermModerateSeverityReligiousDiscrimination Prefix risk
    LabelModerate SeverityReligious Discrimination
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#ReligiousDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is ModerateDiscrimination based on a person's religious beliefs or practices
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -13278,8 +20558,7 @@

    Monitor Consequence

    - @@ -13300,7 +20579,7 @@

    Monitor Consequence

    - + @@ -13316,10 +20595,7 @@

    Monitor Consequence

    - - - - + @@ -13333,23 +20609,23 @@

    Monitor Consequence

    -
    -

    Monitor Control

    +
    +

    Remove Consequence

    TermMonitorConsequenceRemedyControl Prefix risk
    LabelMonitor ConsequenceRemedy Control
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#RemedyControl
    Broader/Parent types risk:MonitorControl - → risk:RiskControl + risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionControl that monitors a Risk ConsequenceControl to remedy consequences of event
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -13361,7 +20637,8 @@

    Monitor Control

    - @@ -13382,12 +20659,9 @@

    Monitor Control

    - + - - - - + @@ -13418,23 +20692,23 @@

    Monitor Control

    -
    -

    Monitor Impact

    +
    +

    Remove Impact

    TermMonitorControlRemoveConsequence Prefix risk
    LabelMonitor ControlRemove Consequence
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#RemoveConsequence
    Broader/Parent types risk:RiskControl + risk:ConsequenceControl + → risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsControl that removes Consequence i.e. prevents it from materialising
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    - + - + - + @@ -13446,7 +20720,7 @@

    Monitor Impact

    - - + @@ -13501,23 +20775,23 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Remove Source

    TermMonitorImpactRemoveImpact Prefix risk
    LabelMonitor ImpactRemove Impact
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#RemoveImpact
    Broader/Parent types risk:MonitorControl + risk:ImpactControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13468,7 +20742,7 @@

    Monitor Impact

    DefinitionControl that monitors a Risk ImpactControl that removes Impact i.e. prevents it from materialising
    - + - + - + @@ -13529,7 +20803,7 @@

    Monitor Risk

    - - + @@ -13584,48 +20858,43 @@

    Monitor Risk

    -
    -

    Monitor Control

    + + + +
    +

    Remuneration

    TermMonitorRiskRemoveSource Prefix risk
    LabelMonitor RiskRemove Source
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#RemoveSource
    Broader/Parent types risk:MonitorControl + risk:SourceControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13551,7 +20825,7 @@

    Monitor Risk

    DefinitionControl that monitors a RiskControl that removes the risk source
    - + - + - + - + - - - - - + @@ -13634,7 +20903,7 @@

    Monitor Control

    - + @@ -13647,18 +20916,21 @@

    Monitor Control

    - + - + + + + - + - @@ -13667,48 +20939,42 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    + + + +
    +

    Reputational Risk

    TermMonitorRiskControlRenumeration Prefix risk
    LabelMonitor ControlRemuneration
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlSomething that acts as or provides renumeration which is in monetary or financial form
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13717,7 +20983,7 @@

    Monitor Risk Source

    - + @@ -13728,20 +20994,14 @@

    Monitor Risk Source

    - - - - + - - - - + - @@ -13750,48 +21010,44 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    + + + +
    +

    Requirements Bias

    TermMonitorRiskSourceReputationalRisk Prefix risk
    LabelMonitor Risk SourceReputational Risk
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceRisks and issues that affect the reputation of the organisation
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13800,31 +21056,37 @@

    Monitor Vulnerabilities

    - + - + + + + - + + + + - + - + - @@ -13833,35 +21095,43 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    + + + +
    +

    Reverse Discrimination

    TermMonitorVulnerabilitiesRequirementsBias Prefix risk
    LabelMonitor VulnerabilitiesRequirements Bias
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#RequirementsBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk VulnerabilityBias that occurs in or during requirements creation
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -13875,12 +21145,9 @@

    Non-Material Damage

    - + - - - - + @@ -13891,21 +21158,15 @@

    Non-Material Damage

    - + - - - - - - - - + + - @@ -13914,38 +21175,40 @@

    Non-Material Damage

    -
    -

    Non-Normality Bias

    + + + +
    +

    Reward

    TermNonMaterialDamageReverseDiscrimination Prefix risk
    LabelNon-Material DamageReverse Discrimination
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#ReverseDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -13958,34 +21221,34 @@

    Non-Normality Bias

    - + - - - - + - + - + + + + - + - @@ -13994,39 +21257,40 @@

    Non-Normality Bias

    -
    -

    Non-Response Bias

    + + + +
    +

    Erosion of Rights

    TermNonNormalityBiasReward Prefix risk
    LabelNon-Normality BiasReward
    IRIhttps://w3id.org/dpv/risk#NonNormalityBiashttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleadingSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Source
    Date Created2024-09-132024-04-14
    Date Modified2024-08-16
    ContributorsDaniel DohertyGeorg P. Krog, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14039,34 +21303,28 @@

    Non-Response Bias

    - + - + + + + - - - - + - - - - + - - - - + - @@ -14075,35 +21333,40 @@

    Non-Response Bias

    -
    -

    Operational Security Risk

    + + + +
    +

    Obstruction of Rights

    TermNonResponseBiasRightEroded Prefix risk
    LabelNon-Response BiasErosion of Rights
    IRIhttps://w3id.org/dpv/risk#NonResponseBiashttps://w3id.org/dpv/risk#RightEroded
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation biasThe gradual weakening or reduction of the scope and protection of rights
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14116,9 +21379,12 @@

    Operational Security Risk

    - + - + + + + @@ -14134,7 +21400,7 @@

    Operational Security Risk

    - @@ -14143,37 +21409,40 @@

    Operational Security Risk

    -
    -

    Out-Group Homogeneity Bias

    + + + +
    +

    Denial of Rights

    TermOperationalSecurityRiskRightObstructed Prefix risk
    LabelOperational Security RiskObstruction of Rights
    IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#RightObstructed
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionRisks and issues that arise during operational processesInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14186,34 +21455,28 @@

    Out-Group Homogeneity Bias

    - + - + + + + - - - - + - - - - + - - - - + - @@ -14222,35 +21485,39 @@

    Out-Group Homogeneity Bias

    -
    -

    Payment

    + + + +
    +

    Prevent Exercising of Rights

    TermOutGroupHomogeneityBiasRightsDenial Prefix risk
    LabelOut-Group Homogeneity BiasDenial of Rights
    IRIhttps://w3id.org/dpv/risk#OutGroupHomogeneityBiashttps://w3id.org/dpv/risk#RightsDenial
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristicsThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14264,9 +21531,12 @@

    Payment

    - + - + + + + @@ -14277,7 +21547,7 @@

    Payment

    - + @@ -14291,7 +21561,7 @@

    Payment

    - @@ -14300,30 +21570,33 @@

    Payment

    -
    -

    Personal Safety Endangerment

    + + + +
    +

    Impact to Rights

    TermPaymentRightsExercisePrevention Prefix risk
    LabelPaymentPrevent Exercising of Rights
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#RightsExercisePrevention
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:RightsImpact + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-04-142022-08-18
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -14342,9 +21615,12 @@

    Personal Safety Endangerment

    - + - + + + + @@ -14372,7 +21648,7 @@

    Personal Safety Endangerment

    - @@ -14381,38 +21657,39 @@

    Personal Safety Endangerment

    -
    -

    Phishing Scam

    + + + +
    +

    Limitation of Rights

    TermPersonalSafetyEndangermentRightsImpact Prefix risk
    LabelPersonal Safety EndangermentImpact to Rights
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    DefinitionSomething that acts as or causes Personal Safety EndangermentSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -14426,23 +21703,23 @@

    Phishing Scam

    - + - + + + + - - - - + - + @@ -14450,13 +21727,13 @@

    Phishing Scam

    - + - @@ -14465,35 +21742,40 @@

    Phishing Scam

    -
    -

    Physical Assault

    + + + +
    +

    Unfulfilment of Rights

    TermPhishingScamRightsLimitation Prefix risk
    LabelPhishing ScamLimitation of Rights
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#RightsLimitation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:RightsImpact + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Phishing ScamA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172022-08-18
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14506,37 +21788,28 @@

    Physical Assault

    - + - + + + + - - - - + - - - - - - - - - - - - + + + - @@ -14545,35 +21818,40 @@

    Physical Assault

    -
    -

    Physical Harm

    + + + +
    +

    Violation of Rights

    TermPhysicalAssaultRightsUnfulfilled Prefix risk
    LabelPhysical AssaultUnfulfilment of Rights
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#RightsUnfulfilled
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Physical AssaultFailure to meet or complete the fulfilment of rights
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14584,8 +21862,14 @@

    Physical Harm

    - - + + + + + + + + @@ -14594,51 +21878,64 @@

    Physical Harm

    - - - + + + + + + + + + + + + -
    TermPhysicalHarmRightsViolation Prefix risk
    LabelPhysical HarmViolation of Rights
    IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#RightsViolation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    + + + + - -
    -

    Privacy

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -14649,24 +21946,36 @@

    Privacy

    - + + + + - + + + + - + + + + - + + + + - @@ -14674,36 +21983,35 @@

    Privacy

    - -
    -

    Psychological Harm

    +
    +

    Risk Assessment

    TermPrivacyRiskAnalysis Prefix risk
    LabelPrivacyRisk Analysis
    IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IndividualRisk + risk:RiskAssessment + → risk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -14716,7 +22024,7 @@

    Psychological Harm

    - + @@ -14725,28 +22033,22 @@

    Psychological Harm

    - + - + - - - - - - - - + + - @@ -14754,41 +22056,46 @@

    Psychological Harm

    - -
    -

    Public Order Breach

    +
    +

    Risk Control

    TermPsychologicalHarmRiskAssessment Prefix risk
    LabelPsychological HarmRisk Assessment
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IndividualRisk + risk:RiskManagement
    DefinitionSomething that acts as or causes Psychological HarmAssessment of risk involving its identification, analysis, and evaluation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -14797,37 +22104,31 @@

    Public Order Breach

    - + + + + - - - - + - - - - - - - - - - - + + + + + - @@ -14835,48 +22136,36 @@

    Public Order Breach

    - -
    -

    Recovery Control

    +
    +

    Risk Management

    TermPublicOrderBreachRiskControl Prefix risk
    LabelPublic Order BreachRisk Control
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Public Order BreachControl that modifies risk
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Date Created2024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in DEX
    - + - + - + - + - - - + - - - - + @@ -14885,20 +22174,23 @@

    Recovery Control

    - + - + + + + - + @@ -14906,7 +22198,7 @@

    Recovery Control

    - @@ -14915,48 +22207,40 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Risk Matrix

    TermRecoveryControlRiskManagement Prefix risk
    LabelRecovery ControlRisk Management
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RiskManagement
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to recover from eventSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2024-05-192024-06-12
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -14965,20 +22249,23 @@

    Reduce Likelihood

    - + - + + + + - + @@ -14989,7 +22276,7 @@

    Reduce Likelihood

    - @@ -14998,48 +22285,41 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    +
    +

    Risk Matrix 3x3

    TermReduceLikelihoodRiskMatrix Prefix risk
    LabelReduce LikelihoodRisk Matrix
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood of an eventCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2024-05-192024-02-14
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -15048,7 +22328,7 @@

    Reduce Severity

    - + @@ -15061,7 +22341,7 @@

    Reduce Severity

    - + @@ -15072,7 +22352,7 @@

    Reduce Severity

    - @@ -15081,47 +22361,41 @@

    Reduce Severity

    -
    -

    Reduction Control

    +
    +

    Risk Matrix 5x5

    TermReduceSeverityRiskMatrix3x3 Prefix risk
    LabelReduce SeverityRisk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#RiskMatrix3x3
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an eventA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15130,7 +22404,7 @@

    Reduction Control

    - + @@ -15143,15 +22417,18 @@

    Reduction Control

    - + - + + + + - @@ -15160,41 +22437,37 @@

    Reduction Control

    - - -
    -

    Re-identification

    +
    +

    Risk Matrix 7x7

    TermReductionControlRiskMatrix5x5 Prefix risk
    LabelReduction ControlRisk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#RiskMatrix5x5
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - @@ -15207,12 +22480,9 @@

    Re-identification

    - + - - - - + @@ -15223,12 +22493,9 @@

    Re-identification

    - + - - - - + @@ -15237,7 +22504,7 @@

    Re-identification

    - @@ -15245,46 +22512,41 @@

    Re-identification

    - -
    -

    Remedy Control

    +
    +

    Risk Source

    TermReidentificationRiskMatrix7x7 Prefix risk
    LabelRe-identificationRisk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#RiskMatrix7x7
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Re-identificationA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - @@ -15295,7 +22557,7 @@

    Remedy Control

    - + @@ -15308,15 +22570,18 @@

    Remedy Control

    - + - + + + + - @@ -15325,48 +22590,42 @@

    Remedy Control

    -
    -

    Remove Consequence

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    TermRemedyControlRiskSource Prefix risk
    LabelRemedy ControlRisk Source
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasRiskSource
    DefinitionControl to remedy consequences of eventThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2024-05-192024-02-14
    Date Modified2024-08-16
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -15375,7 +22634,7 @@

    Remove Consequence

    - + @@ -15388,7 +22647,7 @@

    Remove Consequence

    - + @@ -15399,7 +22658,7 @@

    Remove Consequence

    - @@ -15407,49 +22666,43 @@

    Remove Consequence

    - -
    -

    Remove Impact

    + +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRemoveConsequenceRM3x3S1L1 Prefix risk
    LabelRemove ConsequenceLow Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#RM3x3S1L1
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Consequence i.e. prevents it from materialisingNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15458,7 +22711,7 @@

    Remove Impact

    - + @@ -15471,7 +22724,7 @@

    Remove Impact

    - + @@ -15482,7 +22735,7 @@

    Remove Impact

    - @@ -15491,48 +22744,42 @@

    Remove Impact

    -
    -

    Remove Source

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRemoveImpactRM3x3S1L2 Prefix risk
    LabelRemove ImpactLow Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RM3x3S1L2
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Impact i.e. prevents it from materialisingNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15541,7 +22788,7 @@

    Remove Source

    - + @@ -15554,7 +22801,7 @@

    Remove Source

    - + @@ -15565,7 +22812,7 @@

    Remove Source

    - @@ -15574,36 +22821,38 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRemoveSourceRM3x3S1L3 Prefix risk
    LabelRemove SourceModerate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RM3x3S1L3
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15616,7 +22865,7 @@

    Remuneration

    - + @@ -15629,21 +22878,18 @@

    Remuneration

    - + - - - - + - + - @@ -15652,35 +22898,38 @@

    Remuneration

    -
    -

    Reputational Risk

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRenumerationRM3x3S2L1 Prefix risk
    LabelRemunerationLow Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RM3x3S2L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    Date Created2024-04-142022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15693,7 +22942,7 @@

    Reputational Risk

    - + @@ -15704,14 +22953,20 @@

    Reputational Risk

    - + + + + - + + + + - @@ -15720,37 +22975,38 @@

    Reputational Risk

    -
    -

    Requirements Bias

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermReputationalRiskRM3x3S2L2 Prefix risk
    LabelReputational RiskModerate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RM3x3S2L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionRisks and issues that affect the reputation of the organisationNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15763,37 +23019,31 @@

    Requirements Bias

    - + - - - - + - - - - + - + - + - @@ -15802,36 +23052,38 @@

    Requirements Bias

    -
    -

    Reward

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRequirementsBiasRM3x3S2L3 Prefix risk
    LabelRequirements BiasHigh Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RequirementsBiashttps://w3id.org/dpv/risk#RM3x3S2L3
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionBias that occurs in or during requirements creationNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2024-09-132022-08-17
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15844,7 +23096,7 @@

    Reward

    - + @@ -15857,21 +23109,18 @@

    Reward

    - + - - - - + - + - @@ -15880,36 +23129,38 @@

    Reward

    -
    -

    Prevent Exercising of Rights

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRewardRM3x3S3L1 Prefix risk
    LabelRewardModerate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RM3x3S3L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    Date Created2024-04-142022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15922,12 +23173,9 @@

    Prevent Exercising of Rights

    - + - - - - + @@ -15938,21 +23186,18 @@

    Prevent Exercising of Rights

    - + - - - - + - + - @@ -15961,50 +23206,42 @@

    Prevent Exercising of Rights

    -
    -

    Impact to Rights

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRightsExercisePreventionRM3x3S3L2 Prefix risk
    LabelPrevent Exercising of RightsHigh Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RM3x3S3L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Prevent Exercising of RightsNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - + @@ -16013,20 +23250,14 @@

    Impact to Rights

    - + - - - - + - - - - + @@ -16034,10 +23265,7 @@

    Impact to Rights

    - - - - + @@ -16046,7 +23274,7 @@

    Impact to Rights

    - @@ -16055,36 +23283,38 @@

    Impact to Rights

    -
    -

    Limitation of Rights

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRightsImpactRM3x3S3L3 Prefix risk
    LabelImpact to RightsHigh Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RM3x3S3L3
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:Impact - → dpv:Consequence - → dpv:RiskConcept -
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionSomething that acts as or causes Impact to RightsNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16097,12 +23327,9 @@

    Limitation of Rights

    - + - - - - + @@ -16113,21 +23340,18 @@

    Limitation of Rights

    - + - - - - + - + - @@ -16136,36 +23360,38 @@

    Limitation of Rights

    -
    -

    Violation of Rights

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRightsLimitationRM5x5S1L1 Prefix risk
    LabelLimitation of RightsVery Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RM5x5S1L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Limitation of RightsNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16178,12 +23404,9 @@

    Violation of Rights

    - + - - - - + @@ -16194,61 +23417,57 @@

    Violation of Rights

    - + - - - - + - + -
    TermRightsViolationRM5x5S1L2 Prefix risk
    LabelViolation of RightsVery Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RM5x5S1L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Violation of RightsNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - - - - -
    -

    Risk Analysis

    + +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    - + - + - + - + - @@ -16262,23 +23481,20 @@

    Risk Analysis

    - + - - - - + - + @@ -16289,7 +23505,7 @@

    Risk Analysis

    - @@ -16297,35 +23513,39 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRiskAnalysisRM5x5S1L3 Prefix risk
    LabelRisk AnalysisVery Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RM5x5S1L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    SourceIEC 31010:2019
    Date Created2022-08-182022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16338,31 +23558,31 @@

    Risk Assessment

    - + - - - - + - + - + + + + - @@ -16370,46 +23590,43 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRiskAssessmentRM5x5S1L4 Prefix risk
    LabelRisk AssessmentLow Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RM5x5S1L4
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskManagement + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionAssessment of risk involving its identification, analysis, and evaluationNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    Source
    Date Created2024-02-142022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -16418,13 +23635,10 @@

    Risk Control

    - + - - - @@ -16434,15 +23648,18 @@

    Risk Control

    - + - + + + + - @@ -16450,33 +23667,40 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRiskControlRM5x5S1L5 Prefix risk
    LabelRisk ControlLow Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RM5x5S1L5
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that modifies riskNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
    - + - + - + - + - + + + @@ -16488,31 +23712,31 @@

    Risk Management

    - + - - - - + - + - + + + + - @@ -16521,35 +23745,37 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRiskManagementRM5x5S2L1 Prefix risk
    LabelRisk ManagementVery Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RM5x5S2L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    Source
    Date Created2024-06-122022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16563,23 +23789,20 @@

    Risk Matrix

    - + - - - - + - + @@ -16590,7 +23813,7 @@

    Risk Matrix

    - @@ -16599,23 +23822,23 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRiskMatrixRM5x5S2L2 Prefix risk
    LabelRisk MatrixLow Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM5x5S2L2
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -16627,7 +23850,8 @@

    Risk Matrix 3x3

    - @@ -16642,7 +23866,7 @@

    Risk Matrix 3x3

    - + @@ -16675,23 +23899,23 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRiskMatrix3x3RM5x5S2L3 Prefix risk
    LabelRisk Matrix 3x3Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM5x5S2L3
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -16703,7 +23927,8 @@

    Risk Matrix 5x5

    - @@ -16718,7 +23943,7 @@

    Risk Matrix 5x5

    - + @@ -16751,23 +23976,23 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRiskMatrix5x5RM5x5S2L4 Prefix risk
    LabelRisk Matrix 5x5Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM5x5S2L4
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -16779,7 +24004,8 @@

    Risk Matrix 7x7

    - @@ -16794,7 +24020,7 @@

    Risk Matrix 7x7

    - + @@ -16826,43 +24052,43 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    + +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRiskMatrix7x7RM5x5S2L5 Prefix risk
    LabelRisk Matrix 7x7High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM5x5S2L5
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + - + - - - - - + @@ -16871,7 +24097,7 @@

    Risk Source

    - + @@ -16884,18 +24110,18 @@

    Risk Source

    - + + - - - - + + + - @@ -16904,23 +24130,23 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRiskSourceRM5x5S3L1 Prefix risk
    LabelRisk SourceVery Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM5x5S3L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -16932,7 +24158,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - - + @@ -16981,23 +24207,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM3x3S1L1RM5x5S3L2 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM5x5S3L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16948,7 +24174,7 @@

    Low Risk (RM3x3 S:1 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -17009,7 +24235,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - - + @@ -17058,23 +24284,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM3x3S1L2RM5x5S3L3 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM5x5S3L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17025,7 +24251,7 @@

    Low Risk (RM3x3 S:1 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -17086,7 +24312,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - - + @@ -17135,23 +24361,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM3x3S1L3RM5x5S3L4 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM5x5S3L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17102,7 +24328,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -17163,7 +24389,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - - + @@ -17212,23 +24438,23 @@

    Low Risk (RM3x3 S:2 L:1)

    -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM3x3S2L1RM5x5S3L5 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM5x5S3L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17179,7 +24405,7 @@

    Low Risk (RM3x3 S:2 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -17240,7 +24466,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + @@ -17289,23 +24515,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM3x3S2L2RM5x5S4L1 Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S4L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17256,7 +24482,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -17317,7 +24543,7 @@

    High Risk (RM3x3 S:2 L:3)

    - - + @@ -17366,23 +24592,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM3x3S2L3RM5x5S4L2 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S4L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17333,7 +24559,7 @@

    High Risk (RM3x3 S:2 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -17394,7 +24620,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - + @@ -17443,23 +24669,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM3x3S3L1RM5x5S4L3 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S4L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17410,7 +24636,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -17471,7 +24697,7 @@

    High Risk (RM3x3 S:3 L:2)

    - - + @@ -17520,23 +24746,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM3x3S3L2RM5x5S4L4 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S4L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17487,7 +24713,7 @@

    High Risk (RM3x3 S:3 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -17548,7 +24774,7 @@

    High Risk (RM3x3 S:3 L:3)

    - - + @@ -17597,23 +24823,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM3x3S3L3RM5x5S4L5 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S4L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17564,7 +24790,7 @@

    High Risk (RM3x3 S:3 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -17641,7 +24867,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -17674,23 +24900,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM5x5S1L1RM5x5S5L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S5L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -17718,7 +24944,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -17751,23 +24977,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM5x5S1L2RM5x5S5L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S5L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -17795,7 +25021,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -17828,23 +25054,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM5x5S1L3RM5x5S5L3 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S5L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -17872,7 +25098,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - + @@ -17905,23 +25131,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM5x5S1L4RM5x5S5L4 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S5L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -17949,7 +25175,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - + @@ -17982,23 +25208,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM5x5S1L5RM5x5S5L5 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S5L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -18010,7 +25236,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - - + @@ -18059,23 +25285,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM5x5S2L1RM7x7S1L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM7x7S1L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18026,7 +25252,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -18087,7 +25313,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - - + @@ -18136,23 +25362,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM5x5S2L2RM7x7S1L2 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM7x7S1L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18103,7 +25329,7 @@

    Low Risk (RM5x5 S:2 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -18164,7 +25390,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - - + @@ -18213,23 +25439,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM5x5S2L3RM7x7S1L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM7x7S1L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18180,7 +25406,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -18241,7 +25467,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - - + @@ -18290,23 +25516,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM5x5S2L4RM7x7S1L4 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM7x7S1L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18257,7 +25483,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -18318,7 +25544,7 @@

    High Risk (RM5x5 S:2 L:5)

    - - + @@ -18367,23 +25593,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM5x5S2L5RM7x7S1L5 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM7x7S1L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18334,7 +25560,7 @@

    High Risk (RM5x5 S:2 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + - + @@ -18395,7 +25621,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - - + @@ -18444,23 +25670,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM5x5S3L1RM7x7S1L6 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM7x7S1L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18411,7 +25637,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -18472,7 +25698,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - - + @@ -18521,23 +25747,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM5x5S3L2RM7x7S1L7 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM7x7S1L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18488,7 +25714,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -18549,7 +25775,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - - + @@ -18598,23 +25824,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM5x5S3L3RM7x7S2L1 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM7x7S2L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18565,7 +25791,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -18626,7 +25852,7 @@

    High Risk (RM5x5 S:3 L:4)

    - - + @@ -18675,23 +25901,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM5x5S3L4RM7x7S2L2 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM7x7S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18642,7 +25868,7 @@

    High Risk (RM5x5 S:3 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -18703,7 +25929,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - - + @@ -18752,23 +25978,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM5x5S3L5RM7x7S2L3 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM7x7S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18719,7 +25945,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -18780,7 +26006,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - - + @@ -18829,23 +26055,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM5x5S4L1RM7x7S2L4 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM7x7S2L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18796,7 +26022,7 @@

    Low Risk (RM5x5 S:4 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -18857,7 +26083,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - - + @@ -18906,23 +26132,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM5x5S4L2RM7x7S2L5 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM7x7S2L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18873,7 +26099,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -18934,7 +26160,7 @@

    High Risk (RM5x5 S:4 L:3)

    - - + @@ -18983,23 +26209,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM5x5S4L3RM7x7S2L6 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM7x7S2L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18950,7 +26176,7 @@

    High Risk (RM5x5 S:4 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -19011,7 +26237,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - - + @@ -19060,23 +26286,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM5x5S4L4RM7x7S2L7 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM7x7S2L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19027,7 +26253,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -19088,7 +26314,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - - + @@ -19137,23 +26363,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM5x5S4L5RM7x7S3L1 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM7x7S3L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19104,7 +26330,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -19165,7 +26391,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - - + @@ -19214,23 +26440,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM5x5S5L1RM7x7S3L2 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S3L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19181,7 +26407,7 @@

    Low Risk (RM5x5 S:5 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -19242,7 +26468,7 @@

    High Risk (RM5x5 S:5 L:2)

    - - + @@ -19291,23 +26517,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM5x5S5L2RM7x7S3L3 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S3L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19258,7 +26484,7 @@

    High Risk (RM5x5 S:5 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -19319,7 +26545,7 @@

    High Risk (RM5x5 S:5 L:3)

    - - + @@ -19368,23 +26594,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM5x5S5L3RM7x7S3L4 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S3L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19335,7 +26561,7 @@

    High Risk (RM5x5 S:5 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -19396,7 +26622,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - - + @@ -19445,23 +26671,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM5x5S5L4RM7x7S3L5 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S3L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19412,7 +26638,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -19473,7 +26699,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - - + @@ -19522,23 +26748,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM5x5S5L5RM7x7S3L6 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S3L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19489,7 +26715,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -19566,7 +26792,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - + @@ -19599,23 +26825,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S1L1RM7x7S3L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -19643,7 +26869,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - + @@ -19676,23 +26902,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S1L2RM7x7S4L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -19720,7 +26946,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - + @@ -19753,23 +26979,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S1L3RM7x7S4L2 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -19797,7 +27023,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - + @@ -19830,23 +27056,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S1L4RM7x7S4L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -19874,7 +27100,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - + @@ -19907,23 +27133,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S1L5RM7x7S4L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -19951,7 +27177,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -19984,23 +27210,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S1L6RM7x7S4L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -20028,7 +27254,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -20061,23 +27287,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S1L7RM7x7S4L6 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -20105,7 +27331,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -20138,23 +27364,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S2L1RM7x7S4L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -20182,7 +27408,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -20215,23 +27441,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S2L2RM7x7S5L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -20259,7 +27485,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -20292,23 +27518,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S2L3RM7x7S5L2 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -20336,7 +27562,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -20369,23 +27595,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S2L4RM7x7S5L3 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -20413,7 +27639,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -20446,23 +27672,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S2L5RM7x7S5L4 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -20490,7 +27716,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -20523,23 +27749,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S2L6RM7x7S5L5 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -20567,7 +27793,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -20600,23 +27826,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S2L7RM7x7S5L6 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -20644,7 +27870,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -20677,23 +27903,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S3L1RM7x7S5L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -20721,7 +27947,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -20754,23 +27980,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S3L2RM7x7S6L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -20798,7 +28024,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -20831,23 +28057,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S3L3RM7x7S6L2 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -20875,7 +28101,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -20908,23 +28134,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S3L4RM7x7S6L3 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -20952,7 +28178,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -20985,23 +28211,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S3L5RM7x7S6L4 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -21029,7 +28255,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -21062,23 +28288,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S3L6RM7x7S6L5 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -21106,7 +28332,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -21139,23 +28365,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S3L7RM7x7S6L6 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -21183,7 +28409,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -21216,23 +28442,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S4L1RM7x7S6L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -21260,7 +28486,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -21293,23 +28519,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S4L2RM7x7S7L1 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -21337,7 +28563,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -21370,23 +28596,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S4L3RM7x7S7L2 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -21414,7 +28640,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -21447,23 +28673,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermRM7x7S4L4RM7x7S7L3 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)High Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S7L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -21491,7 +28717,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -21524,23 +28750,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermRM7x7S4L5RM7x7S7L4 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S7L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -21568,7 +28794,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -21601,23 +28827,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermRM7x7S4L6RM7x7S7L5 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S7L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    - + - + - + @@ -21645,7 +28871,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -21678,23 +28904,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermRM7x7S4L7RM7x7S7L6 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)Extremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S7L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -21722,7 +28948,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -21755,38 +28981,40 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    + + + +
    +

    Rule-Based System Design

    TermRM7x7S5L1RM7x7S7L7 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Extremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S7L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + - + - @@ -21799,31 +29027,37 @@

    Low Risk (RM7x7 S:5 L:2)

    - + - + + + + - + + + + - + - + - @@ -21832,38 +29066,42 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    + + + + + +
    +

    Sabotage

    TermRM7x7S5L2RuleBasedSystemDesign Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)Rule-Based System Design
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -21876,14 +29114,17 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + - + + + + @@ -21891,7 +29132,10 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + + + + @@ -21900,7 +29144,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - @@ -21909,38 +29153,42 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    + + + +
    +

    Sampling Bias

    TermRM7x7S5L3Sabotage Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)Sabotage
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateSomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -21953,31 +29201,34 @@

    High Risk (RM7x7 S:5 L:4)

    - + - + + + + - + - + - @@ -21986,38 +29237,41 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    + + + + +
    +

    Scam

    TermRM7x7S5L4SamplingBias Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Sampling Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#SamplingBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22030,14 +29284,17 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + - + + + + @@ -22045,7 +29302,10 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + + + + @@ -22054,7 +29314,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - @@ -22063,38 +29323,41 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    + + + + + +
    +

    Security Attack

    TermRM7x7S5L5Scam Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Scam
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22107,7 +29370,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -22118,20 +29381,14 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - - - - + - - - - + - @@ -22140,38 +29397,42 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    + + + + + + +
    +

    Security Breach

    TermRM7x7S5L6SecurityAttack Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Security Attack
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes an attack on security with the aim of undermining it
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22184,14 +29445,17 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + - + + + + @@ -22199,7 +29463,10 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + + + + @@ -22208,7 +29475,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - @@ -22217,38 +29484,41 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    + + + +
    +

    Selection Bias

    TermRM7x7S5L7SecurityBreach Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)Security Breach
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:OperationalSecurityRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes Security Breach
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22261,31 +29531,34 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + - + + + + - + - + - @@ -22294,38 +29567,51 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    + + + + + + + + +
    +

    Sex Discrimination

    TermRM7x7S6L1SelectionBias Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Selection Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#SelectionBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22338,7 +29624,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -22351,18 +29637,15 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + - - - - + - @@ -22371,38 +29654,44 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    + + + +
    +

    Sexism

    TermRM7x7S6L2SexDiscrimination Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)Sex Discrimination
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#SexDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateDiscrimination based on a person's biological sex
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22415,7 +29704,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -22428,18 +29717,15 @@

    High Risk (RM7x7 S:6 L:3)

    - + - - - - + - @@ -22448,38 +29734,39 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    + + + +
    +

    Sexual Harassment

    TermRM7x7S6L3Sexism Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Sexism
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#Sexism
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighDiscrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22490,10 +29777,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - - - - + @@ -22503,20 +29787,14 @@

    Very High Risk (RM7x7 S:6 L:4)

    - - - - + - - - - + - @@ -22525,38 +29803,44 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    + + + +
    +

    SexualOrientation Discrimination

    TermRM7x7S6L4SexualHarassment Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Sexual Harassment
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#SexualHarassment
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Harm + → risk:IndividualRisk
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22569,7 +29853,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -22582,18 +29866,15 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + - - - - + - @@ -22602,38 +29883,39 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    + + + +
    +

    Sexual Violence

    TermRM7x7S6L5SexualOrientationDiscrimination Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)SexualOrientation Discrimination
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#SexualOrientationDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighDiscrimination based on a person's sexual orientation, typically against those who are not heterosexual
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22646,14 +29928,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + + + + @@ -22661,7 +29946,10 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + + + + @@ -22670,7 +29958,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - @@ -22679,42 +29967,47 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Share Risk

    TermRM7x7S6L6SexualViolence Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Sexual Violence
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#SexualViolence
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Harm + → risk:IndividualRisk
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes Sexual Violence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -22723,7 +30016,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -22736,7 +30029,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -22747,7 +30040,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - @@ -22756,38 +30049,40 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    + + + +
    +

    Simpson'S Paradox Bias

    TermRM7x7S6L7ShareRisk Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Share Risk
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#ShareRisk
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    Date Created2022-08-172024-05-19
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -22800,31 +30095,34 @@

    Low Risk (RM7x7 S:7 L:1)

    - + - + + + + - + - + - @@ -22833,38 +30131,39 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    + + + +
    +

    Social Disadvantage

    TermRM7x7S7L1SimpsonsParadoxBias Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)Simpson'S Paradox Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#SimpsonsParadoxBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22877,7 +30176,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -22890,18 +30189,21 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + - + + + + - + - @@ -22910,38 +30212,40 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    + + + +
    +

    Societal Bias

    TermRM7x7S7L2SocialDisadvantage Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Social Disadvantage
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#SocialDisadvantage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateSomething that acts as or causes Social Disadvantage
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22954,31 +30258,34 @@

    High Risk (RM7x7 S:7 L:3)

    - + - + + + + - + - + - @@ -22987,38 +30294,39 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    + + + +
    +

    Societal Health & Safety

    TermRM7x7S7L3SocietalBias Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Societal Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#SocietalBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23029,10 +30337,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - - - - + @@ -23042,20 +30347,14 @@

    Very High Risk (RM7x7 S:7 L:4)

    - - - - + - - - - + - @@ -23064,38 +30363,38 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    + + + +
    +

    Societal Risk

    TermRM7x7S7L4SocietalHealthSafety Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Societal Health & Safety
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#SocietalHealthSafety
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23108,7 +30407,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -23119,20 +30418,14 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - - - - + - - - - + - @@ -23141,42 +30434,47 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Source Control

    TermRM7x7S7L5SocietalRisk Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Societal Risk
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#SocietalRisk
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighRisks and issues that affect or have the potential to affect society at large or specific groups in society
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -23185,7 +30483,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -23198,7 +30496,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -23209,7 +30507,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - @@ -23218,38 +30516,42 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    + + + + + +
    +

    Spoofing

    TermRM7x7S7L6SourceControl Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Source Control
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#SourceControl
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighRisk Mitigation Measure that controls the Source
    Date Created2022-08-172024-05-19
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -23262,14 +30564,17 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - + + + + @@ -23277,7 +30582,10 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + + + + @@ -23286,7 +30594,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - @@ -23295,35 +30603,38 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    + + + +
    +

    Statistical Bias

    TermRM7x7S7L7Spoofing Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Spoofing
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#Spoofing
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes Spoofing
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23338,12 +30649,9 @@

    Rule-Based System Design

    - + - - - - + @@ -23362,13 +30670,13 @@

    Rule-Based System Design

    - + - @@ -23377,42 +30685,40 @@

    Rule-Based System Design

    -
    -

    Sabotage

    + + + + +
    +

    System Failure

    TermRuleBasedSystemDesignStatisticalBias Prefix risk
    LabelRule-Based System DesignStatistical Bias
    IRIhttps://w3id.org/dpv/risk#RuleBasedSystemDesignhttps://w3id.org/dpv/risk#StatisticalBias
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias + risk:DataBiasrisk:Biasrisk:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -23425,16 +30731,19 @@

    Sabotage

    - + - + + + + - + @@ -23455,7 +30764,7 @@

    Sabotage

    - @@ -23464,39 +30773,42 @@

    Sabotage

    -
    -

    Sampling Bias

    + + + + + +
    +

    System Intrusion

    TermSabotageSystemFailure Prefix risk
    LabelSabotageSystem Failure
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#SystemFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:OperationalSecurityRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes SabotageSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Landscape for Ransomware Attacks 2022
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23509,7 +30821,7 @@

    Sampling Bias

    - + @@ -23518,25 +30830,28 @@

    Sampling Bias

    - + - + - + + + + - + - @@ -23545,38 +30860,39 @@

    Sampling Bias

    -
    -

    Scam

    + + + + +
    +

    System Malfunction

    TermSamplingBiasSystemIntrusion Prefix risk
    LabelSampling BiasSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#SamplingBiashttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when data records are not collected randomly from the intended populationSomething that acts as or causes System Intrusion
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -23590,9 +30906,12 @@

    Scam

    - + - + + + + @@ -23620,7 +30939,7 @@

    Scam

    - @@ -23629,45 +30948,39 @@

    Scam

    -
    -

    Security Attack

    + + + +
    +

    Terrorism

    TermScamSystemMalfunction Prefix risk
    LabelScamSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:OperationalSecurityRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes ScamSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -23680,25 +30993,37 @@

    Security Attack

    - + - + + + + - - - + + + + + + + + + + + + - @@ -23706,50 +31031,51 @@

    Security Attack

    - -
    -

    Security Breach

    +
    +

    Threat

    TermSecurityAttackTerrorism Prefix risk
    LabelSecurity AttackTerrorism
    IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#Terrorism
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:SocietalRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itSomething that acts as or causes Terrorism
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + + + + + + + + @@ -23758,37 +31084,28 @@

    Security Breach

    - + - - - - + - + - - - - - - - - + + - @@ -23796,43 +31113,40 @@

    Security Breach

    - -
    -

    Selection Bias

    +
    +

    Threat Source

    TermSecurityBreachThreat Prefix risk
    LabelSecurity BreachThreat
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#Threat
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:RiskSourcedpv:RiskConcept
    Subject of relation risk:exploitsVulnerability, + risk:hasThreatSource +
    Object of relation risk:causedByThreat, + risk:hasRiskSource, + risk:isExploitedBy +
    DefinitionSomething that acts as or causes Security BreachRisk source event which causes Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - + - + + + + @@ -23841,34 +31155,28 @@

    Selection Bias

    - + - - - - + - + - - - - + - @@ -23880,37 +31188,43 @@

    Selection Bias

    - - -
    -

    Sexual Violence

    +
    +

    Transphobia

    TermSelectionBiasThreatSource Prefix risk
    LabelSelection BiasThreat Source
    IRIhttps://w3id.org/dpv/risk#SelectionBiashttps://w3id.org/dpv/risk#ThreatSource
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept -
    Object of relation risk:hasThreatSource +
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionSource of threat event, including both agent and non-agent sources
    Source
    Date Created2024-09-132024-02-14
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section CORE in RISK
    - + - + - + - + - + + @@ -23923,37 +31237,28 @@

    Sexual Violence

    - + - - - - + - + - - - - - - - - + + - @@ -23962,47 +31267,47 @@

    Sexual Violence

    -
    -

    Share Risk

    + + + + + + +
    +

    Unauthorised Access to Premises

    TermSexualViolenceTransphobia Prefix risk
    LabelSexual ViolenceTransphobia
    IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#Transphobia
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IndividualRisk + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Sexual ViolenceHostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -24011,22 +31316,28 @@

    Share Risk

    - + - + + + + - + - + + + + @@ -24035,7 +31346,7 @@

    Share Risk

    - @@ -24044,37 +31355,42 @@

    Share Risk

    -
    -

    Simpson'S Paradox Bias

    + + + + + + +
    +

    Unauthorised Activity

    TermShareRiskUnauthorisedAccesstoPremises Prefix risk
    LabelShare RiskUnauthorised Access to Premises
    IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#UnauthorisedAccesstoPremises
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Unauthorised Access to Premises
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24087,34 +31403,25 @@

    Simpson'S Paradox Bias

    - + - - - - + - - - - + - - - - + - @@ -24123,35 +31430,41 @@

    Simpson'S Paradox Bias

    -
    -

    Social Disadvantage

    + + + + + +
    +

    Unauthorised Code Access

    TermSimpsonsParadoxBiasUnauthorisedActivity Prefix risk
    LabelSimpson'S Paradox BiasUnauthorised Activity
    IRIhttps://w3id.org/dpv/risk#SimpsonsParadoxBiashttps://w3id.org/dpv/risk#UnauthorisedActivity
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combinedSomething that acts as or causes Unauthorised Activity
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24165,20 +31478,23 @@

    Social Disadvantage

    - + - + + + + - + @@ -24186,13 +31502,13 @@

    Social Disadvantage

    - + - @@ -24201,37 +31517,41 @@

    Social Disadvantage

    -
    -

    Societal Bias

    + + + + +
    +

    Unauthorised Code Disclosure

    TermSocialDisadvantageUnauthorisedCodeAccess Prefix risk
    LabelSocial DisadvantageUnauthorised Code Access
    IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Social DisadvantageSomething that acts as or causes Unauthorised Code Access
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-192022-08-17
    Date Modified
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24244,7 +31564,7 @@

    Societal Bias

    - + @@ -24253,25 +31573,28 @@

    Societal Bias

    - + - + - + + + + - + - @@ -24280,35 +31603,40 @@

    Societal Bias

    -
    -

    Societal Health & Safety

    + + + + +
    +

    Unauthorised Code Modification

    TermSocietalBiasUnauthorisedCodeDisclosure Prefix risk
    LabelSocietal BiasUnauthorised Code Disclosure
    IRIhttps://w3id.org/dpv/risk#SocietalBiashttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in societySomething that acts as or causes Unauthorised Code Disclosure
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24320,24 +31648,39 @@

    Societal Health & Safety

    - + + + + - + + + + - - - + + + + + + + + + + + + - @@ -24346,35 +31689,41 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + + + + +
    +

    Unauthorised Data Access

    TermSocietalHealthSafetyUnauthorisedCodeModification Prefix risk
    LabelSocietal Health & SafetyUnauthorised Code Modification
    IRIhttps://w3id.org/dpv/risk#SocietalHealthSafetyhttps://w3id.org/dpv/risk#UnauthorisedCodeModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code Modification
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24387,25 +31736,37 @@

    Societal Risk

    - + - + + + + - - - + + + + + + + + + + + + - @@ -24414,47 +31775,45 @@

    Societal Risk

    -
    -

    Source Control

    + + + + +
    +

    Unauthorised Data Disclosure

    TermSocietalRiskUnauthorisedDataAccess Prefix risk
    LabelSocietal RiskUnauthorised Data Access
    IRIhttps://w3id.org/dpv/risk#SocietalRiskhttps://w3id.org/dpv/risk#UnauthorisedDataAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societySomething that acts as or causes Unauthorised Data Access
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -24463,22 +31822,28 @@

    Source Control

    - + - + + + + - + - + + + + @@ -24487,7 +31852,7 @@

    Source Control

    - @@ -24496,45 +31861,40 @@

    Source Control

    -
    -

    Spoofing

    + + + + +
    +

    Unauthorised Data Modification

    TermSourceControlUnauthorisedDataDisclosure Prefix risk
    LabelSource ControlUnauthorised Data Disclosure
    IRIhttps://w3id.org/dpv/risk#SourceControlhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceSomething that acts as or causes Unauthorised Data Disclosure
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -24548,7 +31908,7 @@

    Spoofing

    - + @@ -24557,7 +31917,7 @@

    Spoofing

    - + @@ -24578,7 +31938,7 @@

    Spoofing

    - @@ -24587,37 +31947,41 @@

    Spoofing

    -
    -

    Statistical Bias

    + + + + +
    +

    Unauthorised Information Disclosure

    TermSpoofingUnauthorisedDataModification Prefix risk
    LabelSpoofingUnauthorised Data Modification
    IRIhttps://w3id.org/dpv/risk#Spoofinghttps://w3id.org/dpv/risk#UnauthorisedDataModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes SpoofingSomething that acts as or causes Unauthorised Data Modification
    SourceISO/IEC 27005:2018, ISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24630,7 +31994,7 @@

    Statistical Bias

    - + @@ -24639,25 +32003,28 @@

    Statistical Bias

    - + - + - + + + + - + - @@ -24666,38 +32033,40 @@

    Statistical Bias

    -
    -

    System Failure

    + + + + +
    +

    Unauthorised Re-Identification

    TermStatisticalBiasUnauthorisedInformationDisclosure Prefix risk
    LabelStatistical BiasUnauthorised Information Disclosure
    IRIhttps://w3id.org/dpv/risk#StatisticalBiashttps://w3id.org/dpv/risk#UnauthorisedInformationDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimatesSomething that acts as or causes Unauthorised Information Disclosure
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -24711,26 +32080,20 @@

    System Failure

    - + - - - - + - - - - + - + @@ -24738,13 +32101,13 @@

    System Failure

    - + - @@ -24753,45 +32116,41 @@

    System Failure

    -
    -

    System Intrusion

    + + + + +
    +

    Unauthorised Resource Use

    TermSystemFailureUnauthorisedReidentification Prefix risk
    LabelSystem FailureUnauthorised Re-Identification
    IRIhttps://w3id.org/dpv/risk#SystemFailurehttps://w3id.org/dpv/risk#UnauthorisedReidentification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes System FailureSomething that acts as or causes Unauthorised Re-Identification
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172022-08-19
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -24804,7 +32163,7 @@

    System Intrusion

    - + @@ -24813,7 +32172,7 @@

    System Intrusion

    - + @@ -24834,7 +32193,7 @@

    System Intrusion

    - @@ -24843,38 +32202,41 @@

    System Intrusion

    -
    -

    System Malfunction

    + + + + + +
    +

    Unauthorised System Access

    TermSystemIntrusionUnauthorisedResourceUse Prefix risk
    LabelSystem IntrusionUnauthorised Resource Use
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#UnauthorisedResourceUse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes System IntrusionSomething that acts as or causes Unauthorised Resource Use
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -24888,12 +32250,9 @@

    System Malfunction

    - + - - - - + @@ -24921,7 +32280,7 @@

    System Malfunction

    - @@ -24930,35 +32289,40 @@

    System Malfunction

    -
    -

    Terrorism

    + + + + +
    +

    Unauthorised System Modification

    TermSystemMalfunctionUnauthorisedSystemAccess Prefix risk
    LabelSystem MalfunctionUnauthorised System Access
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#UnauthorisedSystemAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionSomething that acts as or causes Unauthorised System Access
    Usage NoteHere system refers to both hardware and software systems
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24972,7 +32336,7 @@

    Terrorism

    - + @@ -24981,7 +32345,7 @@

    Terrorism

    - + @@ -25002,7 +32366,7 @@

    Terrorism

    - @@ -25010,51 +32374,47 @@

    Terrorism

    -
    -

    Threat

    + + + + + + +
    +

    Unwanted Code Deletion

    TermTerrorismUnauthorisedSystemModification Prefix risk
    LabelTerrorismUnauthorised System Modification
    IRIhttps://w3id.org/dpv/risk#Terrorismhttps://w3id.org/dpv/risk#UnauthorisedSystemModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes TerrorismSomething that acts as or causes Unauthorised System Modification
    SourceISO/IEC 27005:2018ENISA Methodology for Sectoral Cybersecurity Assessments
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + + @@ -25063,28 +32423,37 @@

    Threat

    - + - + + + + - + - - + + + + + + + + - @@ -25092,40 +32461,47 @@

    Threat

    -
    -

    Threat Source

    + + + + + + +
    +

    Unwanted Data Deletion

    TermThreatUnwantedCodeDeletion Prefix risk
    LabelThreatUnwanted Code Deletion
    IRIhttps://w3id.org/dpv/risk#Threathttps://w3id.org/dpv/risk#UnwantedCodeDeletion
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskSource + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    Subject of relation risk:exploitsVulnerability, - risk:hasThreatSource -
    Object of relation risk:causedByThreat, - risk:hasRiskSource, - risk:isExploitedBy -
    DefinitionRisk source event which causes RiskSomething that acts as or causes Unwanted Code Deletion
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + - - - - + @@ -25134,28 +32510,37 @@

    Threat Source

    - + - + + + + - + - - + + + + + + + + - @@ -25164,45 +32549,41 @@

    Threat Source

    -
    -

    Unauthorised Access to Premises

    + + + + +
    +

    Unwanted Disclosure of Data

    TermThreatSourceUnwantedDataDeletion Prefix risk
    LabelThreat SourceUnwanted Data Deletion
    IRIhttps://w3id.org/dpv/risk#ThreatSourcehttps://w3id.org/dpv/risk#UnwantedDataDeletion
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    Object of relation risk:hasThreatSource -
    DefinitionSource of threat event, including both agent and non-agent sourcesSomething that acts as or causes Unwanted Data Deletion
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -25215,7 +32596,7 @@

    Unauthorised Access to Premises

    - + @@ -25245,7 +32626,7 @@

    Unauthorised Access to Premises

    - @@ -25254,45 +32635,37 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Activity

    + + +
    +

    User Risks

    TermUnauthorisedAccesstoPremisesUnwantedDisclosureData Prefix risk
    LabelUnauthorised Access to PremisesUnwanted Disclosure of Data
    IRIhttps://w3id.org/dpv/risk#UnauthorisedAccesstoPremiseshttps://w3id.org/dpv/risk#UnwantedDisclosureData
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesSomething that acts as or causes Unwanted Disclosure of Data
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -25305,7 +32678,7 @@

    Unauthorised Activity

    - + @@ -25323,7 +32696,7 @@

    Unauthorised Activity

    - @@ -25332,46 +32705,48 @@

    Unauthorised Activity

    -
    -

    Unauthorised Code Access

    +
    +

    Very High Likelihood

    TermUnauthorisedActivityUserRisks Prefix risk
    LabelUnauthorised ActivityUser Risks
    IRIhttps://w3id.org/dpv/risk#UnauthorisedActivityhttps://w3id.org/dpv/risk#UserRisks
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised ActivityConcepts associated with risks that arise due to User or Human use
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + + + + @@ -25380,28 +32755,25 @@

    Unauthorised Code Access

    - + - + + + + - - - - + - + - - - - + @@ -25410,7 +32782,7 @@

    Unauthorised Code Access

    - @@ -25419,43 +32791,48 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    +
    +

    Very High Risk

    TermUnauthorisedCodeAccessVeryHighLikelihood Prefix risk
    LabelUnauthorised Code AccessVery High Likelihood
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeAccesshttps://w3id.org/dpv/risk#VeryHighLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:IntegrityConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Unauthorised Code AccessLevel where Likelihood is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25464,28 +32841,25 @@

    Unauthorised Code Disclosure

    - + - + + + + - - - - + - + - - - - + @@ -25494,7 +32868,7 @@

    Unauthorised Code Disclosure

    - @@ -25503,43 +32877,48 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    +
    +

    Very High Severity

    TermUnauthorisedCodeDisclosureVeryHighRisk Prefix risk
    LabelUnauthorised Code DisclosureVery High Risk
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosurehttps://w3id.org/dpv/risk#VeryHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept + risk:5RiskLevels + → dpv:RiskLevel
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureLevel where Risk is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25548,28 +32927,25 @@

    Unauthorised Code Modification

    - + - + + + + - - - - + - + - - - - + @@ -25578,7 +32954,7 @@

    Unauthorised Code Modification

    - @@ -25587,43 +32963,48 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    +
    +

    Very Low Likelihood

    TermUnauthorisedCodeModificationVeryHighSeverity Prefix risk
    LabelUnauthorised Code ModificationVery High Severity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeModificationhttps://w3id.org/dpv/risk#VeryHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5SeverityLevels + → dpv:Severity
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Unauthorised Code ModificationLevel where Severity is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25632,28 +33013,25 @@

    Unauthorised Data Access

    - + - + + + + - - - - + - + - - - - + @@ -25662,7 +33040,7 @@

    Unauthorised Data Access

    - @@ -25671,43 +33049,48 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    +
    +

    Very Low Risk

    TermUnauthorisedDataAccessVeryLowLikelihood Prefix risk
    LabelUnauthorised Data AccessVery Low Likelihood
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataAccesshttps://w3id.org/dpv/risk#VeryLowLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConfidentialityConcept + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Unauthorised Data AccessLevel where Likelihood is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25716,28 +33099,25 @@

    Unauthorised Data Disclosure

    - + - + + + + - - - - + - + - - - - + @@ -25746,7 +33126,7 @@

    Unauthorised Data Disclosure

    - @@ -25755,43 +33135,48 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Very Low Severity

    TermUnauthorisedDataDisclosureVeryLowRisk Prefix risk
    LabelUnauthorised Data DisclosureVery Low Risk
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosurehttps://w3id.org/dpv/risk#VeryLowRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept + risk:5RiskLevels + → dpv:RiskLevel
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureLevel where Risk is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25800,28 +33185,25 @@

    Unauthorised Data Modification

    - + - + + + + - - - - + - + - - - - + @@ -25830,7 +33212,7 @@

    Unauthorised Data Modification

    - @@ -25839,39 +33221,37 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Information Disclosure

    + + +
    +

    Violating Code of Conduct

    TermUnauthorisedDataModificationVeryLowSeverity Prefix risk
    LabelUnauthorised Data ModificationVery Low Severity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataModificationhttps://w3id.org/dpv/risk#VeryLowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5SeverityLevels + → dpv:Severity
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Unauthorised Data ModificationLevel where Severity is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - @@ -25884,16 +33264,19 @@

    Unauthorised Information Disclosure

    - + - + + + + - + @@ -25914,7 +33297,7 @@

    Unauthorised Information Disclosure

    - @@ -25923,39 +33306,37 @@

    Unauthorised Information Disclosure

    -
    -

    Unauthorised Re-Identification

    + + +
    +

    Violation of Contractual Obligation

    TermUnauthorisedInformationDisclosureViolatingCodeOfConduct Prefix risk
    LabelUnauthorised Information DisclosureViolating Code of Conduct
    IRIhttps://w3id.org/dpv/risk#UnauthorisedInformationDisclosurehttps://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureSomething that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -25968,20 +33349,26 @@

    Unauthorised Re-Identification

    - + - + + + + - + + + + - + @@ -25989,13 +33376,13 @@

    Unauthorised Re-Identification

    - + - @@ -26004,39 +33391,37 @@

    Unauthorised Re-Identification

    -
    -

    Unauthorised Resource Use

    + + +
    +

    Violating Ethics Code

    TermUnauthorisedReidentificationViolatingContractualObligation Prefix risk
    LabelUnauthorised Re-IdentificationViolation of Contractual Obligation
    IRIhttps://w3id.org/dpv/risk#UnauthorisedReidentificationhttps://w3id.org/dpv/risk#ViolatingContractualObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -26049,9 +33434,12 @@

    Unauthorised Resource Use

    - + - + + + + @@ -26079,7 +33467,7 @@

    Unauthorised Resource Use

    - @@ -26088,42 +33476,37 @@

    Unauthorised Resource Use

    -
    -

    Unauthorised System Access

    + + +
    +

    Violation of Legal Obligations

    TermUnauthorisedResourceUseViolatingEthicsCode Prefix risk
    LabelUnauthorised Resource UseViolating Ethics Code
    IRIhttps://w3id.org/dpv/risk#UnauthorisedResourceUsehttps://w3id.org/dpv/risk#ViolatingEthicsCode
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Resource UseSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26136,9 +33519,12 @@

    Unauthorised System Access

    - + - + + + + @@ -26166,7 +33552,7 @@

    Unauthorised System Access

    - @@ -26175,39 +33561,37 @@

    Unauthorised System Access

    -
    -

    Unauthorised System Modification

    + + +
    +

    Violating Policy

    TermUnauthorisedSystemAccessViolatingLegalObligation Prefix risk
    LabelUnauthorised System AccessViolation of Legal Obligations
    IRIhttps://w3id.org/dpv/risk#UnauthorisedSystemAccesshttps://w3id.org/dpv/risk#ViolatingLegalObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised System AccessSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -26220,37 +33604,25 @@

    Unauthorised System Modification

    - + - - - - + - - - - - - - - - - - - + + + - @@ -26259,42 +33631,37 @@

    Unauthorised System Modification

    -
    -

    Unwanted Code Deletion

    + + +
    +

    Violation of Statutory Obligations

    TermUnauthorisedSystemModificationViolatingPolicy Prefix risk
    LabelUnauthorised System ModificationViolating Policy
    IRIhttps://w3id.org/dpv/risk#UnauthorisedSystemModificationhttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised System ModificationSomething that acts as or causes violation of policy which can be either internal or external policy
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26307,16 +33674,19 @@

    Unwanted Code Deletion

    - + - + + + + - + @@ -26337,7 +33707,7 @@

    Unwanted Code Deletion

    - @@ -26346,42 +33716,39 @@

    Unwanted Code Deletion

    -
    -

    Unwanted Data Deletion

    + + + +
    +

    Violence against children

    TermUnwantedCodeDeletionViolatingStatutoryObligations Prefix risk
    LabelUnwanted Code DeletionViolation of Statutory Obligations
    IRIhttps://w3id.org/dpv/risk#UnwantedCodeDeletionhttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unwanted Code DeletionSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26394,16 +33761,19 @@

    Unwanted Data Deletion

    - + - + + + + - + @@ -26424,7 +33794,7 @@

    Unwanted Data Deletion

    - @@ -26432,44 +33802,47 @@

    Unwanted Data Deletion

    - -
    -

    Unwanted Disclosure of Data

    +
    +

    Vulnerability

    TermUnwantedDataDeletionViolenceAgainstChildren Prefix risk
    LabelUnwanted Data DeletionViolence against children
    IRIhttps://w3id.org/dpv/risk#UnwantedDataDeletionhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Unwanted Data DeletionSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - + + + + + + + + + @@ -26478,87 +33851,251 @@

    Unwanted Disclosure of Data

    - + - - - - + - + - - - - - - - - + + -
    TermUnwantedDisclosureDataVulnerability Prefix risk
    LabelUnwanted Disclosure of DataVulnerability
    IRIhttps://w3id.org/dpv/risk#UnwantedDisclosureDatahttps://w3id.org/dpv/risk#Vulnerability
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Subject of relation risk:isExploitedBy, + risk:isVulnerabilityOf +
    Object of relation risk:causedByVulnerability, + risk:exploitsVulnerability, + risk:hasVulnerability +
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    + +
    +
    +

    Properties

    + -
    -

    User Risks

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    caused by threat

    - + - + - + - + - - - - + - + + + + - + @@ -26569,14 +34106,17 @@

    User Risks

    - + + + + - @@ -26584,63 +34124,50 @@

    User Risks

    - -
    -

    Very High Likelihood

    +
    +

    caused by vulnerability

    TermUserRiskscausedByThreat Prefix risk
    LabelUser Riskscaused by threat
    IRIhttps://w3id.org/dpv/risk#UserRiskshttps://w3id.org/dpv/risk#causedByThreat
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types dpv:RiskConcept -
    Range includes risk:Threat +
    DefinitionConcepts associated with risks that arise due to User or Human useIndicates the cause of associated context (subject) was the indicated threat (object)
    Date Created2024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + @@ -26651,18 +34178,15 @@

    Very High Likelihood

    - + - - - - + - @@ -26671,148 +34195,279 @@

    Very High Likelihood

    -
    -

    Very High Risk

    -
    TermVeryHighLikelihoodcausedByVulnerability Prefix risk
    LabelVery High Likelihoodcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#VeryHighLikelihoodhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdf:Property, skos:Concept
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    Range includes risk:Vulnerability +
    DefinitionLevel where Likelihood is Very HighIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermVeryHighRiskPrefixrisk
    LabelVery High Risk
    IRIhttps://w3id.org/dpv/risk#VeryHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    -
    -

    Very High Severity

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    exploits vulnerability

    - + - + - + - + - - - - - - - - - - - - + + + + + + + + + + - + - - - - + @@ -26823,18 +34478,15 @@

    Very High Severity

    - + - - - - + - @@ -26843,63 +34495,140 @@

    Very High Severity

    -
    -

    Very Low Likelihood

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    has control

    TermVeryHighSeverityexploitsVulnerability Prefix risk
    LabelVery High Severityexploits vulnerability
    IRIhttps://w3id.org/dpv/risk#VeryHighSeverityhttps://w3id.org/dpv/risk#exploitsVulnerability
    Typerdfs:Class, skos:Concept, dpv:Severityrdf:Property, skos:Concept
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity -
    Object of relation dpv:hasSeverity -
    Domain includes risk:Threat +
    Range includes risk:Vulnerability +
    DefinitionLevel where Severity is Very HighIndicates the threat (subject) exploits the indicated vulnerability (object)
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + + + + @@ -26909,18 +34638,15 @@

    Very Low Likelihood

    - + - - - - + - @@ -26928,63 +34654,50 @@

    Very Low Likelihood

    - -
    -

    Very Low Risk

    +
    +

    has incident

    TermVeryLowLikelihoodhasControl Prefix risk
    LabelVery Low Likelihoodhas control
    IRIhttps://w3id.org/dpv/risk#VeryLowLikelihoodhttps://w3id.org/dpv/risk#hasControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdf:Property, skos:Concept
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    Range includes risk:RiskControl +
    DefinitionLevel where Likelihood is Very LowIndicates the use of specified control
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in DEX
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + @@ -26995,18 +34708,15 @@

    Very Low Risk

    - + - - - - + - @@ -27014,63 +34724,54 @@

    Very Low Risk

    - -
    -

    Very Low Severity

    +
    +

    has risk source

    TermVeryLowRiskhasIncident Prefix risk
    LabelVery Low Riskhas incident
    IRIhttps://w3id.org/dpv/risk#VeryLowRiskhttps://w3id.org/dpv/risk#hasIncident
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdf:Property, skos:Concept
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    Range includes risk:Incident +
    DefinitionLevel where Risk is Very LowIndicates an incident is associated with the specified context
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - - + + + + + + + + + + - + - - - - + @@ -27081,18 +34782,15 @@

    Very Low Severity

    - + - - - - + - @@ -27100,83 +34798,73 @@

    Very Low Severity

    - -
    -

    Violating Code of Conduct

    +
    +

    has threat source

    TermVeryLowSeverityhasRiskSource Prefix risk
    LabelVery Low Severityhas risk source
    IRIhttps://w3id.org/dpv/risk#VeryLowSeverityhttps://w3id.org/dpv/risk#hasRiskSource
    Typerdfs:Class, skos:Concept, dpv:Severityrdf:Property, skos:Concept
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity -
    Object of relation dpv:hasSeverity -
    Domain includes dpv:Risk +
    Range includes risk:RiskSource +
    DefinitionLevel where Severity is Very LowIndicates the risk (subject) has the indicated risk source (object)
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - + - - + + + + + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27184,83 +34872,69 @@

    Violating Code of Conduct

    - -
    -

    Violation of Contractual Obligation

    +
    +

    has vulnerability

    TermViolatingCodeOfConducthasThreatSource Prefix risk
    LabelViolating Code of Conducthas threat source
    IRIhttps://w3id.org/dpv/risk#ViolatingCodeOfConducthttps://w3id.org/dpv/risk#hasThreatSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Threat +
    Range includes risk:ThreatSource +
    DefinitionSomething that acts as or causes Violation of Code of ConductIndicates the threat (subject) has the indicated source (object)
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - + + + + - + - - - - + - - - - - - + + + - + - - - - - - - - + + - @@ -27269,82 +34943,239 @@

    Violation of Contractual Obligation

    -
    -

    Violating Ethics Code

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    is exploited by

    TermViolatingContractualObligationhasVulnerability Prefix risk
    LabelViolation of Contractual Obligationhas vulnerability
    IRIhttps://w3id.org/dpv/risk#ViolatingContractualObligationhttps://w3id.org/dpv/risk#hasVulnerability
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Range includes risk:Vulnerability +
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsIndicates the associated context (subject) has indicated vulnerability (object)
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - - + + + + + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27352,83 +35183,69 @@

    Violating Ethics Code

    - -
    -

    Violation of Legal Obligations

    +
    +

    is vulnerability of

    TermViolatingEthicsCodeisExploitedBy Prefix risk
    LabelViolating Ethics Codeis exploited by
    IRIhttps://w3id.org/dpv/risk#ViolatingEthicsCodehttps://w3id.org/dpv/risk#isExploitedBy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Vulnerability +
    Range includes risk:Threat +
    DefinitionSomething that acts as or causes Violation of Ethics CodeIndicates the vulnerability (subject) is exploited by the indicated threat (object)
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27437,294 +35254,322 @@

    Violation of Legal Obligations

    -
    -

    Violating Policy

    -
    TermViolatingLegalObligationisVulnerabilityOf Prefix risk
    LabelViolation of Legal Obligationsis vulnerability of
    IRIhttps://w3id.org/dpv/risk#ViolatingLegalObligationhttps://w3id.org/dpv/risk#isVulnerabilityOf
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Vulnerability +
    DefinitionSomething that acts as or causes Violation of Legal ObligationsIndicates the vulnerability (subject) is associated with indicated context (object)
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolatingPolicyPrefixrisk
    LabelViolating Policy
    IRIhttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policy
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Violation of Statutory Obligations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolatingStatutoryObligationsPrefixrisk
    LabelViolation of Statutory Obligations
    IRIhttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Violence against children

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolenceAgainstChildrenPrefixrisk
    LabelViolence against children
    IRIhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IndividualRisk -
    DefinitionSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    refers to risk

    - + - + - + - + - - - - - - - - - - + + + + + + + + + - + + + + @@ -27742,19 +35587,178 @@

    Vulnerability

    -
    TermVulnerabilityrefersToRisk Prefix risk
    LabelVulnerabilityrefers to risk
    IRIhttps://w3id.org/dpv/risk#Vulnerabilityhttps://w3id.org/dpv/risk#refersToRisk
    Typerdfs:Class, skos:Conceptrdf:Property, skos:Concept
    Subject of relation risk:isExploitedBy, - risk:isVulnerabilityOf -
    Object of relation risk:causedByVulnerability, - risk:exploitsVulnerability, - risk:hasVulnerability -
    Domain includes dpv:Incident +
    Range includes dpv:Risk +
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskIndicates the incident (subject) is a materialisation of the indicated risk (object)
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    See More: section CORE in RISK + section CORE in DEX
    - -
    -
    -

    Properties

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -27878,7 +35882,6 @@

    Properties

    - @@ -27887,144 +35890,12 @@

    Properties

    -
    -

    caused by threat

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermcausedByThreatPrefixrisk
    Labelcaused by threat
    IRIhttps://w3id.org/dpv/risk#causedByThreat
    Typerdf:Property, skos:Concept
    Range includes risk:Threat -
    DefinitionIndicates the cause of associated context (subject) was the indicated threat (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability -
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28072,8 +35943,6 @@

    caused by vulnerability

    - - @@ -28133,78 +36002,8 @@

    caused by vulnerability

    -
    -

    exploits vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermexploitsVulnerabilityPrefixrisk
    Labelexploits vulnerability
    IRIhttps://w3id.org/dpv/risk#exploitsVulnerability
    Typerdf:Property, skos:Concept
    Domain includes risk:Threat -
    Range includes risk:Vulnerability -
    DefinitionIndicates the threat (subject) exploits the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28255,365 +36054,24 @@

    exploits vulnerability

    -
    -

    has control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasControlPrefixrisk
    Labelhas control
    IRIhttps://w3id.org/dpv/risk#hasControl
    Typerdf:Property, skos:Concept
    Range includes risk:RiskControl -
    DefinitionIndicates the use of specified control
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-02-14
    See More: section CORE in DEX -
    -
    -
    -

    has incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasIncidentPrefixrisk
    Labelhas incident
    IRIhttps://w3id.org/dpv/risk#hasIncident
    Typerdf:Property, skos:Concept
    Range includes risk:Incident -
    DefinitionIndicates an incident is associated with the specified context
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has risk source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasRiskSourcePrefixrisk
    Labelhas risk source
    IRIhttps://w3id.org/dpv/risk#hasRiskSource
    Typerdf:Property, skos:Concept
    Domain includes dpv:Risk -
    Range includes risk:RiskSource -
    DefinitionIndicates the risk (subject) has the indicated risk source (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has threat source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasThreatSourcePrefixrisk
    Labelhas threat source
    IRIhttps://w3id.org/dpv/risk#hasThreatSource
    Typerdf:Property, skos:Concept
    Domain includes risk:Threat -
    Range includes risk:ThreatSource -
    DefinitionIndicates the threat (subject) has the indicated source (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasVulnerabilityPrefixrisk
    Labelhas vulnerability
    IRIhttps://w3id.org/dpv/risk#hasVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability -
    DefinitionIndicates the associated context (subject) has indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28646,8 +36104,6 @@

    has vulnerability

    - - @@ -28727,148 +36183,12 @@

    has vulnerability

    -
    -

    is exploited by

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermisExploitedByPrefixrisk
    Labelis exploited by
    IRIhttps://w3id.org/dpv/risk#isExploitedBy
    Typerdf:Property, skos:Concept
    Domain includes risk:Vulnerability -
    Range includes risk:Threat -
    DefinitionIndicates the vulnerability (subject) is exploited by the indicated threat (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    is vulnerability of

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermisVulnerabilityOfPrefixrisk
    Labelis vulnerability of
    IRIhttps://w3id.org/dpv/risk#isVulnerabilityOf
    Typerdf:Property, skos:Concept
    Domain includes risk:Vulnerability -
    DefinitionIndicates the vulnerability (subject) is associated with indicated context (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -29003,114 +36323,145 @@

    is vulnerability of

    -
    -

    refers to risk

    - - - - - - - - - - - - - - - - - - - - - - - - + +
    +

    DPV uses the following terms from [[RDF]] and [[RDFS]] with their defined meanings:

    +
      +
    • rdf:type to denote a concept is an instance of another concept
    • +
    • rdfs:Class to denote a concept is a Class or a category
    • +
    • rdfs:subClassOf to specify the concept is a subclass (subtype, sub-category, subset) of another concept
    • +
    • rdf:Property to denote a concept is a property or a relation
    • +
    +

    The following external concepts are re-used within DPV:

    +

    External

    + + - -
    - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - -
    TermrefersToRiskPrefixrisk
    Labelrefers to risk
    IRIhttps://w3id.org/dpv/risk#refersToRisk
    Typerdf:Property, skos:Concept
    Domain includes dpv:Incident -
    Range includes dpv:Risk -
    DefinitionIndicates the incident (subject) is a materialisation of the indicated risk (object)
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-14
    See More: section CORE in DEX -
    -
    + + + + + + + + + + + + + + + @@ -29118,70 +36469,88 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + @@ -29190,64 +36559,82 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + @@ -29256,405 +36643,433 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - -
    -
    -

    DPV uses the following terms from [[RDF]] and [[RDFS]] with their defined meanings:

    -
      -
    • rdf:type to denote a concept is an instance of another concept
    • -
    • rdfs:Class to denote a concept is a Class or a category
    • -
    • rdfs:subClassOf to specify the concept is a subclass (subtype, sub-category, subset) of another concept
    • -
    • rdf:Property to denote a concept is a property or a relation
    • -
    -

    The following external concepts are re-used within DPV:

    -

    External

    - + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + - + @@ -29669,58 +37084,47 @@

    External

    - - - - - - - - + - - - - - + - + @@ -29737,6 +37141,7 @@

    External

    + @@ -29752,138 +37157,134 @@

    External

    - - - - - + - + - - - - + - - - + - - + - + - + + + - + - + - - + + + + + + + + - - - + @@ -29901,59 +37302,99 @@

    External

    - - - - + - - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -29976,6 +37417,7 @@

    External

    + @@ -29984,7 +37426,6 @@

    External

    - @@ -30120,6 +37561,7 @@

    External

    + @@ -30159,17 +37601,11 @@

    External

    - - - - - - @@ -30185,6 +37621,7 @@

    External

    + @@ -30218,88 +37655,86 @@

    External

    - + - - + - + - - - - + - - - - + + + + + + - + - + - + - + - + @@ -30308,31 +37743,31 @@

    External

    - + - + - + - + - + @@ -30341,220 +37776,178 @@

    External

    - - + - + - - - - + - - - + + - + - - - - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - + - - - - + - - + - - - @@ -30578,22 +37971,37 @@

    External

    + + + + + + + + + + + + + + + @@ -30634,5 +38042,69 @@

    Funding Acknowledgements for Contributors

    + \ No newline at end of file diff --git a/2.1-dev/risk/risk-owl.html b/2.1-dev/risk/risk-owl.html index 27850fa79..6e7961ec7 100644 --- a/2.1-dev/risk/risk-owl.html +++ b/2.1-dev/risk/risk-owl.html @@ -437,7 +437,6 @@

    Classes

    -
    @@ -1236,6 +1235,9 @@

    Accidental Incident

    + + +

    Accidental Misuse

    @@ -1264,12 +1266,16 @@

    Accidental Misuse

    - @@ -1299,7 +1305,92 @@

    Accidental Misuse

    - + + + +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:UserRisks + risk-owl:Misuse + → risk-owl:UserRisksdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Age Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAgeDiscriminationPrefixrisk-owl
    LabelAge Discrimination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#AgeDiscrimination
    + https://w3id.org/dpv/risk#AgeDiscrimination +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionDiscrimination based on a person's age, often impacting older or younger individuals
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    @@ -1307,6 +1398,10 @@

    Accidental Misuse

    + + + +

    Authorisation Failure

    @@ -1335,17 +1430,15 @@

    Authorisation Failure

    - - - - @@ -1388,7 +1481,7 @@

    Authorisation Failure

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:IntegrityConcept -
    Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -1396,6 +1489,10 @@

    Authorisation Failure

    + + + +

    None

    @@ -1424,38 +1521,15 @@

    None

    - - - - - - - - - - - - - + + + +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:DataBreach - → risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:IntegrityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:IntegrityConcept -
    Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -1485,7 +1559,84 @@

    None

    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    +
    + + +
    +

    Availability Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityConceptPrefixrisk-owl
    LabelAvailability Concept
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#AvailabilityConcept
    + https://w3id.org/dpv/risk#AvailabilityConcept +
    Type rdfs:Class + , owl:Class +
    Sub-class of dpv-owl:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Core
    @@ -1654,6 +1805,9 @@

    Avoid Source

    + + +

    Benefit

    @@ -1682,12 +1836,17 @@

    Benefit

    - @@ -1726,7 +1885,7 @@

    Benefit

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:FinancialImpact + risk-owl:Compensation + → risk-owl:Renumeration + → risk-owl:FinancialImpactdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -1734,6 +1893,9 @@

    Benefit

    + + +

    Bias

    @@ -1761,6 +1923,9 @@

    Bias

    @@ -1801,16 +1966,19 @@

    Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inAi BiasAi Risk-taxonomy
    - + + + + @@ -1842,15 +2010,17 @@

    Blackmail

    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource Sub-class of - risk-owl:ConfidentialityConcept - - Sub-class of - risk-owl:ExternalSecurityThreat + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -1892,7 +2062,7 @@

    Blackmail

    Documented in - Risk Risk-consequences + Risk Risk-taxonomy @@ -1900,6 +2070,10 @@

    Blackmail

    + + + +

    Brute Force Authorisations

    @@ -1928,19 +2102,18 @@

    Brute Force Authorisations

    - - - - - @@ -1981,7 +2154,7 @@

    Brute Force Authorisations

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -1992,26 +2165,25 @@

    Brute Force Authorisations

    - -
    -

    Change Consequence

    +
    +

    Caste Discrimination

    - + - + @@ -2020,26 +2192,26 @@

    Change Consequence

    - + + - - - - + @@ -2048,7 +2220,7 @@

    Change Consequence

    - + @@ -2061,16 +2233,13 @@

    Change Consequence

    - + - - - - + - +
    TermChangeConsequenceCasteDiscrimination Prefix risk-owl
    LabelChange ConsequenceCaste Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ChangeConsequence
    - https://w3id.org/dpv/risk#ChangeConsequence + https://w3id.org/dpv/risk/owl/#CasteDiscrimination
    + https://w3id.org/dpv/risk#CasteDiscrimination
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:ConsequenceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that changes ConsequenceDiscrimination based on a person's caste, a form of social stratification found in some cultures
    Date Created2024-05-192024-09-30
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -2078,25 +2247,29 @@

    Change Consequence

    -
    -

    Change Impact

    + + + + +
    +

    Change Consequence

    - + - + @@ -2111,7 +2284,7 @@

    Change Impact

    - - + @@ -2163,9 +2336,98 @@

    Change Impact

    -
    -

    Coercion

    -
    TermChangeImpactChangeConsequence Prefix risk-owl
    LabelChange ImpactChange Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ChangeImpact
    - https://w3id.org/dpv/risk#ChangeImpact + https://w3id.org/dpv/risk/owl/#ChangeConsequence
    + https://w3id.org/dpv/risk#ChangeConsequence
    Sub-class of risk-owl:ImpactControl + risk-owl:ConsequenceControlrisk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure @@ -2133,7 +2306,7 @@

    Change Impact

    DefinitionControl that changes ImpactControl that changes Consequence
    +
    +

    Change Impact

    +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeImpactPrefixrisk-owl
    LabelChange Impact
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ChangeImpact
    + https://w3id.org/dpv/risk#ChangeImpact +
    Type rdfs:Class + , owl:Class + , risk-owl:RiskControl +
    Sub-class of risk-owl:ImpactControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    +
    + + + + + + + +
    +

    Coercion

    + @@ -2191,15 +2453,17 @@

    Coercion

    - - - @@ -2241,7 +2505,7 @@

    Coercion

    - +
    Term rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -2249,6 +2513,9 @@

    Coercion

    + + +

    Cognitive Bias

    @@ -2276,6 +2543,9 @@

    Cognitive Bias

    @@ -2317,11 +2587,11 @@

    Cognitive Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inAi BiasAi Risk-taxonomy
    @@ -2329,6 +2599,9 @@

    Cognitive Bias

    + + +

    Compensation

    @@ -2357,12 +2630,16 @@

    Compensation

    - @@ -2401,7 +2678,7 @@

    Compensation

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:FinancialImpact + risk-owl:Renumeration + → risk-owl:FinancialImpactdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -2409,6 +2686,10 @@

    Compensation

    + + + +

    Component Failure

    @@ -2437,14 +2718,15 @@

    Component Failure

    - - @@ -2478,7 +2760,7 @@

    Component Failure

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -2486,6 +2768,10 @@

    Component Failure

    + + + +

    Component Malfunction

    @@ -2514,14 +2800,15 @@

    Component Malfunction

    - - @@ -2555,7 +2842,7 @@

    Component Malfunction

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -2563,6 +2850,12 @@

    Component Malfunction

    + + + + + +

    Compromise Account

    @@ -2591,21 +2884,18 @@

    Compromise Account

    - - - - - - - @@ -2647,7 +2937,7 @@

    Compromise Account

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:IntegrityConcept -
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -2655,6 +2945,10 @@

    Compromise Account

    + + + +

    Compromise Account Credentials

    @@ -2683,15 +2977,16 @@

    Compromise Account Credentials

    - - - @@ -2733,7 +3028,7 @@

    Compromise Account Credentials

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -2741,6 +3036,10 @@

    Compromise Account Credentials

    + + + +

    Confidentiality Breach

    @@ -2769,38 +3068,15 @@

    Confidentiality Breach

    - - - - - - - - - - - - - + + + +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:DataBreach - → risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:IntegrityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:IntegrityConcept -
    Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -2845,7 +3121,84 @@

    Confidentiality Breach

    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    +
    + + +
    +

    Confidentiality Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityConceptPrefixrisk-owl
    LabelConfidentiality Concept
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ConfidentialityConcept
    + https://w3id.org/dpv/risk#ConfidentialityConcept +
    Type rdfs:Class + , owl:Class +
    Sub-class of dpv-owl:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Core
    @@ -2929,6 +3282,9 @@

    Confidentiality Incident

    + + +

    Confirmation Bias

    @@ -2956,6 +3312,9 @@

    Confirmation Bias

    @@ -2998,11 +3357,11 @@

    Confirmation Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -3010,6 +3369,9 @@

    Confirmation Bias

    + + +

    Confounding Variables Bias

    @@ -3037,6 +3399,9 @@

    Confounding Variables Bias

    @@ -3080,11 +3445,11 @@

    Confounding Variables Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -3257,6 +3622,8 @@

    Containment Control

    + +

    Copyright Violation

    @@ -3285,13 +3652,14 @@

    Copyright Violation

    - @@ -3332,7 +3700,7 @@

    Copyright Violation

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk
    Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:ViolatingObligation
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -3342,6 +3710,9 @@

    Copyright Violation

    + + +

    Coverage Bias

    @@ -3369,6 +3740,9 @@

    Coverage Bias

    @@ -3413,11 +3787,11 @@

    Coverage Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -3501,6 +3875,9 @@

    Cross-Border Incident

    + + +

    Cryptojacking

    @@ -3529,15 +3906,16 @@

    Cryptojacking

    - - - @@ -3579,7 +3957,7 @@

    Cryptojacking

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -3587,6 +3965,9 @@

    Cryptojacking

    + + +

    Damage

    @@ -3615,6 +3996,9 @@

    Damage

    @@ -3659,7 +4043,7 @@

    Damage

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -3667,6 +4051,9 @@

    Damage

    + + +

    Data Aggregation Bias

    @@ -3694,6 +4081,9 @@

    Data Aggregation Bias

    @@ -3736,11 +4126,11 @@

    Data Aggregation Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -3748,8 +4138,11 @@

    Data Aggregation Bias

    -
    -

    Data Bias

    + + + +
    +

    Data Bias

    @@ -3775,6 +4168,9 @@

    Data Bias

    @@ -3816,11 +4212,11 @@

    Data Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -3828,6 +4224,12 @@

    Data Bias

    + + + + + +

    Data Breach

    @@ -3856,23 +4258,17 @@

    Data Breach

    - - - - - - - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:SecurityBreach - → risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:SecurityBreach - → risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:SecurityBreach - → risk-owl:IntegrityConcept -
    Sub-class of risk-owl:SecurityBreachrisk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -3921,7 +4317,7 @@

    Data Breach

    Documented inDex Risk-consequencesDex Risk-taxonomy
    @@ -3929,6 +4325,10 @@

    Data Breach

    + + + +

    Data Corruption

    @@ -3957,14 +4357,15 @@

    Data Corruption

    - - @@ -4010,7 +4411,7 @@

    Data Corruption

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:IntegrityConcept -
    Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -4018,6 +4419,9 @@

    Data Corruption

    + + +

    Data Processing Bias

    @@ -4045,6 +4449,9 @@

    Data Processing Bias

    @@ -4087,11 +4494,11 @@

    Data Processing Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -4175,6 +4582,9 @@

    Deliberate Incident

    + + +

    Denial of Service Attack (DoS)

    @@ -4203,15 +4613,16 @@

    Denial of Service Attack (DoS)

    - - - @@ -4253,7 +4664,7 @@

    Denial of Service Attack (DoS)

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -4342,6 +4753,8 @@

    Detection Control

    + +

    Detriment

    @@ -4370,6 +4783,8 @@

    Detriment

    @@ -4414,7 +4829,177 @@

    Detriment

    - + + + +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Direct Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDirectDiscriminationPrefixrisk-owl
    LabelDirect Discrimination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#DirectDiscrimination
    + https://w3id.org/dpv/risk#DirectDiscrimination +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Disability Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDisabilityDiscriminationPrefixrisk-owl
    LabelDisability Discrimination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#DisabilityDiscrimination
    + https://w3id.org/dpv/risk#DisabilityDiscrimination +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionDiscrimination against individuals based on physical or mental disabilities
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    @@ -4422,6 +5007,10 @@

    Detriment

    + + + +

    Discrimination

    @@ -4450,11 +5039,18 @@

    Discrimination

    + + @@ -4469,7 +5065,7 @@

    Discrimination

    - + @@ -4482,7 +5078,7 @@

    Discrimination

    - + @@ -4494,7 +5090,7 @@

    Discrimination

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskConcept +
    Sub-class of risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Discrimination[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]
    Date Created2022-08-192024-09-30
    Date Modified
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -4502,6 +5098,9 @@

    Discrimination

    + + +

    Distributed Denial of Service Attack (DDoS)

    @@ -4530,15 +5129,17 @@

    Distributed Denial of Service Attack (DDoS)

    - - - @@ -4580,7 +5181,7 @@

    Distributed Denial of Service Attack (DDoS)

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:DenialServiceAttack + → risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -4664,6 +5265,9 @@

    Environmental Incident

    + + +

    Environmental Risk

    @@ -4692,6 +5296,9 @@

    Environmental Risk

    @@ -4726,7 +5333,7 @@

    Environmental Risk

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -4734,6 +5341,10 @@

    Environmental Risk

    + + + +

    Equipment Failure

    @@ -4762,14 +5373,15 @@

    Equipment Failure

    - - @@ -4815,7 +5427,7 @@

    Equipment Failure

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -4823,6 +5435,10 @@

    Equipment Failure

    + + + +

    Equipment Malfunction

    @@ -4851,14 +5467,15 @@

    Equipment Malfunction

    - - @@ -4904,7 +5521,7 @@

    Equipment Malfunction

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -4912,6 +5529,9 @@

    Equipment Malfunction

    + + +

    Erroneous System Use

    @@ -4940,6 +5560,9 @@

    Erroneous System Use

    @@ -4987,7 +5610,7 @@

    Erroneous System Use

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -4997,25 +5620,26 @@

    Erroneous System Use

    -
    -

    Exposure to Harmful Speech

    + +
    +

    Ethnic Discrimination

    - + - + @@ -5024,13 +5648,23 @@

    Exposure to Harmful Speech

    - + + @@ -5044,38 +5678,26 @@

    Exposure to Harmful Speech

    - + - - - - + - - - - + - + - - - - - - - - + + - +
    TermExposureToHarmfulSpeechEthnicDiscrimination Prefix risk-owl
    LabelExposure to Harmful SpeechEthnic Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExposureToHarmfulSpeech
    - https://w3id.org/dpv/risk#ExposureToHarmfulSpeech + https://w3id.org/dpv/risk/owl/#EthnicDiscrimination
    + https://w3id.org/dpv/risk#EthnicDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:SocietalRisk + risk-owl:Racism + → risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Racism + → risk-owl:Discrimination + → risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Harmful SpeechDiscrimination against individuals based on their ethnicity or cultural heritage
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -5083,25 +5705,28 @@

    Exposure to Harmful Speech

    -
    -

    External Security Threat

    + + + +
    +

    Excellence Discrimination

    - + - + @@ -5110,7 +5735,185 @@

    External Security Threat

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermExternalSecurityThreatExcellenceDiscrimination Prefix risk-owl
    LabelExternal Security ThreatExcellence Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExternalSecurityThreat
    - https://w3id.org/dpv/risk#ExternalSecurityThreat + https://w3id.org/dpv/risk/owl/#ExcellenceDiscrimination
    + https://w3id.org/dpv/risk#ExcellenceDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + + + + +
    +

    Exposure to Harmful Speech

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermExposureToHarmfulSpeechPrefixrisk-owl
    LabelExposure to Harmful Speech
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ExposureToHarmfulSpeech
    + https://w3id.org/dpv/risk#ExposureToHarmfulSpeech +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + +
    +

    External Security Threat

    + + + + + + + + + + + + + + + + + + + + + @@ -5145,7 +5948,7 @@

    External Security Threat

    - +
    TermExternalSecurityThreatPrefixrisk-owl
    LabelExternal Security Threat
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ExternalSecurityThreat
    + https://w3id.org/dpv/risk#ExternalSecurityThreat +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialRiskSource
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -5153,6 +5956,10 @@

    External Security Threat

    + + + +

    Extorsion

    @@ -5181,15 +5988,17 @@

    Extorsion

    - - - @@ -5231,7 +6040,7 @@

    Extorsion

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -5743,86 +6552,6 @@

    Extremely Low Severity

    -
    -

    Fee

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermFeePrefixrisk-owl
    LabelFee
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Fee
    - https://w3id.org/dpv/risk#Fee -
    Type rdfs:Class - , owl:Class - , dpv-owl:RiskConcept -
    Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept -
    DefinitionSomething that acts as or provides fees e.g. for using a service
    Source
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-consequences
    -
    @@ -5854,6 +6583,9 @@

    Financial Impact

    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk @@ -5888,7 +6620,7 @@

    Financial Impact

    Documented in - Risk Risk-consequences + Risk Risk-taxonomy @@ -5896,6 +6628,9 @@

    Financial Impact

    + + +

    Financial Loss

    @@ -5924,6 +6659,9 @@

    Financial Loss

    @@ -5971,7 +6709,7 @@

    Financial Loss

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -5979,6 +6717,10 @@

    Financial Loss

    + + + +

    Fraud

    @@ -6007,15 +6749,17 @@

    Fraud

    - - - @@ -6057,7 +6801,7 @@

    Fraud

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -6065,9 +6809,184 @@

    Fraud

    -
    -

    Group Attribution Bias

    - + + + +
    +

    Gender Discrimination

    +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermGenderDiscriminationPrefixrisk-owl
    LabelGender Discrimination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#GenderDiscrimination
    + https://w3id.org/dpv/risk#GenderDiscrimination +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionDiscrimination based on a person's gender identity or gender expression
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Geographic Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermGeographicDiscriminationPrefixrisk-owl
    LabelGeographic Discrimination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#GeographicDiscrimination
    + https://w3id.org/dpv/risk#GeographicDiscrimination +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionDiscrimination based on a person's geographical origin or residence
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Group Attribution Bias

    + @@ -6092,6 +7011,9 @@

    Group Attribution Bias

    @@ -6134,11 +7056,11 @@

    Group Attribution Bias

    - + - +
    Term Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -6231,6 +7153,83 @@

    Halt Source

    + + + +
    +

    Harassment

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermHarassmentPrefixrisk-owl
    LabelHarassment
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#Harassment
    + https://w3id.org/dpv/risk#Harassment +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:Harm + → risk-owl:IndividualRisk +
    Documented inRisk Risk-taxonomy
    +
    + + + + + +

    Harm

    @@ -6259,6 +7258,9 @@

    Harm

    @@ -6305,7 +7307,7 @@

    Harm

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -6599,25 +7601,28 @@

    High Severity

    -
    -

    Human Errors

    + + + +
    +

    Homophobia

    - + - + @@ -6626,13 +7631,23 @@

    Human Errors

    - + + @@ -6646,35 +7661,26 @@

    Human Errors

    - + - - - - + - + - - - - - - - - + + - +
    TermHumanErrorsHomophobia Prefix risk-owl
    LabelHuman ErrorsHomophobia
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HumanErrors
    - https://w3id.org/dpv/risk#HumanErrors + https://w3id.org/dpv/risk/owl/#Homophobia
    + https://w3id.org/dpv/risk#Homophobia
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:UserRisks + risk-owl:SexualOrientationDiscrimination + → risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:SexualOrientationDiscrimination + → risk-owl:Discrimination + → risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Human ErrorsHostility or prejudice against individuals who are or are perceived to be homosexual
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -6682,25 +7688,114 @@

    Human Errors

    -
    -

    Identification Control

    + + + +
    +

    Human Errors

    - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermIdentificationControlHumanErrors Prefix risk-owl
    LabelIdentification ControlHuman Errors
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IdentificationControl
    - https://w3id.org/dpv/risk#IdentificationControl + https://w3id.org/dpv/risk/owl/#HumanErrors
    + https://w3id.org/dpv/risk#HumanErrors +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:UserRisks + → dpv-owl:RiskConcept +
    DefinitionSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + +
    +

    Identification Control

    + + + + + + + + + + + + + + + @@ -6763,6 +7858,10 @@

    Identification Control

    + + + +

    Identity Fraud

    TermIdentificationControlPrefixrisk-owl
    LabelIdentification Control
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#IdentificationControl
    + https://w3id.org/dpv/risk#IdentificationControl
    @@ -6791,15 +7890,17 @@

    Identity Fraud

    - - - @@ -6841,7 +7942,7 @@

    Identity Fraud

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -6849,6 +7950,10 @@

    Identity Fraud

    + + + +

    Identity Theft

    @@ -6877,15 +7982,17 @@

    Identity Theft

    - - - @@ -6927,7 +8034,7 @@

    Identity Theft

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -6935,6 +8042,8 @@

    Identity Theft

    + +

    Illegal Data Processing

    @@ -6963,6 +8072,8 @@

    Illegal Data Processing

    @@ -7013,7 +8124,7 @@

    Illegal Data Processing

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -7105,6 +8216,9 @@

    Impact Control

    + + +

    Implicit Bias

    @@ -7132,6 +8246,9 @@

    Implicit Bias

    @@ -7174,11 +8291,11 @@

    Implicit Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -7255,7 +8372,7 @@

    Incident

    Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9056,6 +10173,94 @@

    Incident Terminated

    + + + +
    +

    Indirect Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermIndirectDiscriminationPrefixrisk-owl
    LabelIndirect Discrimination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#IndirectDiscrimination
    + https://w3id.org/dpv/risk#IndirectDiscrimination +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + +

    Individual Health & Safety

    @@ -9084,6 +10289,9 @@

    Individual Health & Safety

    @@ -9115,13 +10323,16 @@

    Individual Health & Safety

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    + + +

    Individual Risk

    @@ -9149,6 +10360,9 @@

    Individual Risk

    @@ -9180,7 +10394,7 @@

    Individual Risk

    - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -9188,6 +10402,9 @@

    Individual Risk

    + + +

    Informativeness Bias

    @@ -9215,6 +10432,9 @@

    Informativeness Bias

    @@ -9255,11 +10475,11 @@

    Informativeness Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -9267,6 +10487,9 @@

    Informativeness Bias

    + + +

    In-Group Bias

    @@ -9294,6 +10517,9 @@

    In-Group Bias

    @@ -9336,11 +10562,11 @@

    In-Group Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -9348,6 +10574,9 @@

    In-Group Bias

    + + +

    Injury

    @@ -9376,12 +10605,16 @@

    Injury

    - @@ -9422,7 +10655,7 @@

    Injury

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:IndividualRisk + risk-owl:Harm + → risk-owl:IndividualRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -9430,6 +10663,10 @@

    Injury

    + + + +

    None

    @@ -9458,38 +10695,15 @@

    None

    - - - - - - - - - - - - - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:DataBreach - → risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:IntegrityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:IntegrityConcept -
    Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -9519,32 +10733,32 @@

    None

    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    -
    -

    Integrity Incident

    +
    +

    Integrity Concept

    - + - + @@ -9558,16 +10772,11 @@

    Integrity Incident

    - - - - - + @@ -9576,9 +10785,12 @@

    Integrity Incident

    - + - + + + + @@ -9589,40 +10801,122 @@

    Integrity Incident

    - + - + + + + - +
    TermIntegrityIncidentIntegrityConcept Prefix risk-owl
    LabelIntegrity IncidentIntegrity Concept
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IntegrityIncident
    - https://w3id.org/dpv/risk#IntegrityIncident + https://w3id.org/dpv/risk/owl/#IntegrityConcept
    + https://w3id.org/dpv/risk#IntegrityConcept
    Sub-class of risk-owl:Incident - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionIncident where the integrity of information or system has been affectedIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-05-192024-09-29
    ContributorsHarshvardhan J. Pandit
    Documented inRisk IncidentRisk Core
    - -
    -

    Intentional Misuse

    +
    +

    Integrity Incident

    - + - + + https://w3id.org/dpv/risk/owl/#IntegrityIncident
    + https://w3id.org/dpv/risk#IntegrityIncident + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermIntentionalMisuseIntegrityIncident Prefix risk-owl
    LabelIntentional MisuseIntegrity Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IntentionalMisuse
    - https://w3id.org/dpv/risk#IntentionalMisuse -
    Type rdfs:Class + , owl:Class +
    Sub-class of risk-owl:Incident + → dpv-owl:RiskConcept +
    in Range of risk-owl:hasIncident +
    DefinitionIncident where the integrity of information or system has been affected
    Date Created2024-05-19
    Documented inRisk Incident
    +
    + + + + + + +
    +

    Intentional Misuse

    + + + + + + + + + + + + + + + @@ -9631,12 +10925,16 @@

    Intentional Misuse

    - @@ -9666,7 +10964,7 @@

    Intentional Misuse

    - +
    TermIntentionalMisusePrefixrisk-owl
    LabelIntentional Misuse
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#IntentionalMisuse
    + https://w3id.org/dpv/risk#IntentionalMisuse +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:UserRisks + risk-owl:Misuse + → risk-owl:UserRisksdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -9674,6 +10972,10 @@

    Intentional Misuse

    + + + +

    Intercept Communications

    @@ -9702,15 +11004,17 @@

    Intercept Communications

    - - - @@ -9755,7 +11059,7 @@

    Intercept Communications

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -9767,6 +11071,9 @@

    Intercept Communications

    + + +

    Judicial Costs

    @@ -9795,12 +11102,16 @@

    Judicial Costs

    - @@ -9830,7 +11141,7 @@

    Judicial Costs

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:FinancialImpact + risk-owl:FinancialLoss + → risk-owl:FinancialImpactdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -9838,6 +11149,9 @@

    Judicial Costs

    + + +

    Judicial Penalty

    @@ -9866,12 +11180,16 @@

    Judicial Penalty

    - @@ -9901,7 +11219,92 @@

    Judicial Penalty

    - + + + +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:FinancialImpact + risk-owl:FinancialLoss + → risk-owl:FinancialImpactdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Language Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermLanguageDiscriminationPrefixrisk-owl
    LabelLanguage Discrimination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#LanguageDiscrimination
    + https://w3id.org/dpv/risk#LanguageDiscrimination +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionDiscrimination based on a person's language, often linked to national origin or ethnicity
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    @@ -9909,6 +11312,8 @@

    Judicial Penalty

    + +

    Legal Risk

    @@ -9937,6 +11342,8 @@

    Legal Risk

    @@ -9971,7 +11378,7 @@

    Legal Risk

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -9979,6 +11386,9 @@

    Legal Risk

    + + +

    Lose of Credibility

    @@ -10007,6 +11417,9 @@

    Lose of Credibility

    @@ -10054,7 +11467,7 @@

    Lose of Credibility

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -10062,6 +11475,9 @@

    Lose of Credibility

    + + +

    Lose of Customer Confidence

    @@ -10090,6 +11506,9 @@

    Lose of Customer Confidence

    @@ -10137,7 +11556,7 @@

    Lose of Customer Confidence

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -10145,6 +11564,9 @@

    Lose of Customer Confidence

    + + +

    Lose of Goodwill

    @@ -10173,6 +11595,9 @@

    Lose of Goodwill

    @@ -10220,7 +11645,7 @@

    Lose of Goodwill

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -10228,6 +11653,9 @@

    Lose of Goodwill

    + + +

    Lose of Negotiating Capacity

    @@ -10256,6 +11684,9 @@

    Lose of Negotiating Capacity

    @@ -10303,7 +11734,7 @@

    Lose of Negotiating Capacity

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -10311,6 +11742,9 @@

    Lose of Negotiating Capacity

    + + +

    Lose of Opportunity

    @@ -10339,6 +11773,9 @@

    Lose of Opportunity

    @@ -10386,7 +11823,7 @@

    Lose of Opportunity

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -10394,6 +11831,9 @@

    Lose of Opportunity

    + + +

    Lose of Reputation

    @@ -10422,6 +11862,9 @@

    Lose of Reputation

    @@ -10469,7 +11912,7 @@

    Lose of Reputation

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -10477,6 +11920,9 @@

    Lose of Reputation

    + + +

    Lose of Trust

    @@ -10505,6 +11951,9 @@

    Lose of Trust

    @@ -10552,7 +12001,7 @@

    Lose of Trust

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -10836,25 +12285,28 @@

    Low Severity

    -
    -

    Malicious Code Attack

    + + + +
    +

    Malicious Activity

    - + - + @@ -10864,22 +12316,16 @@

    Malicious Code Attack

    - - - - - - @@ -10892,35 +12338,23 @@

    Malicious Code Attack

    - + - - - - + - - - - - - - - - - - - + + + - +
    TermMaliciousCodeAttackMaliciousActivity Prefix risk-owl
    LabelMalicious Code AttackMalicious Activity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MaliciousCodeAttack
    - https://w3id.org/dpv/risk#MaliciousCodeAttack + https://w3id.org/dpv/risk/owl/#MaliciousActivity
    + https://w3id.org/dpv/risk#MaliciousActivity
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept
    DefinitionSomething that acts as or causes Malicious Code AttackIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -10928,25 +12362,30 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    + + + + + +
    +

    Malicious Code Attack

    - + - + @@ -10956,22 +12395,19 @@

    Malware Attack

    - - - - - - - @@ -10984,7 +12420,7 @@

    Malware Attack

    - + @@ -10993,7 +12429,7 @@

    Malware Attack

    - + @@ -11012,7 +12448,7 @@

    Malware Attack

    - +
    TermMalwareAttackMaliciousCodeAttack Prefix risk-owl
    LabelMalware AttackMalicious Code Attack
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MalwareAttack
    - https://w3id.org/dpv/risk#MalwareAttack + https://w3id.org/dpv/risk/owl/#MaliciousCodeAttack
    + https://w3id.org/dpv/risk#MaliciousCodeAttack
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept
    DefinitionSomething that acts as or causes Malware AttackSomething that acts as or causes Malicious Code Attack
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsENISA Reference Incident Classification Taxonomy 2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -11020,6 +12456,103 @@

    Malware Attack

    + + + + + +
    +

    Malware Attack

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMalwareAttackPrefixrisk-owl
    LabelMalware Attack
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MalwareAttack
    + https://w3id.org/dpv/risk#MalwareAttack +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
    DefinitionSomething that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + +

    Material Damage

    @@ -11048,6 +12581,9 @@

    Material Damage

    @@ -11095,7 +12631,181 @@

    Material Damage

    - + + + +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Misandry

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMisandryPrefixrisk-owl
    LabelMisandry
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#Misandry
    + https://w3id.org/dpv/risk#Misandry +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionDislike, contempt, or prejudice against men
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Misogyny

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMisogynyPrefixrisk-owl
    LabelMisogyny
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#Misogyny
    + https://w3id.org/dpv/risk#Misogyny +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    DefinitionDislike, contempt, or prejudice against women
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    @@ -11103,6 +12813,9 @@

    Material Damage

    + + +

    Misuse

    @@ -11131,6 +12844,9 @@

    Misuse

    @@ -11175,7 +12891,7 @@

    Misuse

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -12056,25 +13772,28 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    + + + +
    +

    Nationality Discrimination

    - + - + @@ -12083,13 +13802,21 @@

    Non-Material Damage

    - + + @@ -12103,12 +13830,9 @@

    Non-Material Damage

    - + - - - - + @@ -12119,10 +13843,93 @@

    Non-Material Damage

    - + - - + + + + + + + +
    TermNonMaterialDamageNationalityDiscrimination Prefix risk-owl
    LabelNon-Material DamageNationality Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#NonMaterialDamage
    - https://w3id.org/dpv/risk#NonMaterialDamage + https://w3id.org/dpv/risk/owl/#NationalityDiscrimination
    + https://w3id.org/dpv/risk#NationalityDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:LegalRisk + risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageDiscrimination based on a person's nationality or citizenship
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-09-30
    Date Modified
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Non-Material Damage

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -12131,7 +13938,7 @@

    Non-Material Damage

    - +
    TermNonMaterialDamagePrefixrisk-owl
    LabelNon-Material Damage
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#NonMaterialDamage
    + https://w3id.org/dpv/risk#NonMaterialDamage +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:LegalRisk + → dpv-owl:RiskConcept +
    DefinitionSomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-30
    Date Modified 2024-08-16
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -12139,6 +13946,9 @@

    Non-Material Damage

    + + +

    Non-Normality Bias

    @@ -12166,6 +13976,9 @@

    Non-Normality Bias

    @@ -12209,11 +14022,11 @@

    Non-Normality Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -12221,6 +14034,9 @@

    Non-Normality Bias

    + + +

    Non-Response Bias

    @@ -12248,6 +14064,9 @@

    Non-Response Bias

    @@ -12292,11 +14111,11 @@

    Non-Response Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -12304,6 +14123,8 @@

    Non-Response Bias

    + +

    Operational Security Risk

    @@ -12332,6 +14153,8 @@

    Operational Security Risk

    @@ -12366,7 +14189,7 @@

    Operational Security Risk

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -12374,6 +14197,9 @@

    Operational Security Risk

    + + +

    Out-Group Homogeneity Bias

    @@ -12401,6 +14227,9 @@

    Out-Group Homogeneity Bias

    @@ -12443,11 +14272,11 @@

    Out-Group Homogeneity Bias

    - + - +
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -12455,6 +14284,9 @@

    Out-Group Homogeneity Bias

    + + +

    Payment

    @@ -12483,12 +14315,16 @@

    Payment

    - @@ -12527,7 +14363,7 @@

    Payment

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:FinancialImpact + risk-owl:Renumeration + → risk-owl:FinancialImpactdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -12535,6 +14371,9 @@

    Payment

    + + +

    Personal Safety Endangerment

    @@ -12563,6 +14402,9 @@

    Personal Safety Endangerment

    @@ -12610,7 +14452,7 @@

    Personal Safety Endangerment

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -12618,6 +14460,10 @@

    Personal Safety Endangerment

    + + + +

    Phishing Scam

    @@ -12646,15 +14492,17 @@

    Phishing Scam

    - - - @@ -12696,7 +14544,7 @@

    Phishing Scam

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -12704,6 +14552,9 @@

    Phishing Scam

    + + +

    Physical Assault

    @@ -12732,12 +14583,16 @@

    Physical Assault

    - @@ -12778,7 +14633,7 @@

    Physical Assault

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:IndividualRisk + risk-owl:Harm + → risk-owl:IndividualRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -12786,6 +14641,9 @@

    Physical Assault

    + + +

    Physical Harm

    @@ -12814,12 +14672,16 @@

    Physical Harm

    - @@ -12845,33 +14707,32 @@

    Physical Harm

    - +
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:IndividualRisk + risk-owl:Harm + → risk-owl:IndividualRisk
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    - -
    -

    Privacy

    +
    +

    Potential Consequence

    - + - + @@ -12880,13 +14741,12 @@

    Privacy

    - @@ -12897,8 +14757,14 @@

    Privacy

    - - + + + + + + + + @@ -12907,38 +14773,43 @@

    Privacy

    - - + + + + + + + + - +
    TermPrivacyPotentialConsequence Prefix risk-owl
    LabelPrivacyPotential Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Privacy
    - https://w3id.org/dpv/risk#Privacy + https://w3id.org/dpv/risk/owl/#PotentialConsequence
    + https://w3id.org/dpv/risk#PotentialConsequence
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
    Sub-class of risk-owl:IndividualRisk + dpv-owl:RiskConcept
    DefinitionIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Core
    - -
    -

    Psychological Harm

    +
    +

    Potential Impact

    - + - + @@ -12947,13 +14818,12 @@

    Psychological Harm

    - @@ -12966,61 +14836,57 @@

    Psychological Harm

    - + - + + + + - - - - + - + - - - - + - +
    TermPsychologicalHarmPotentialImpact Prefix risk-owl
    LabelPsychological HarmPotential Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PsychologicalHarm
    - https://w3id.org/dpv/risk#PsychologicalHarm + https://w3id.org/dpv/risk/owl/#PotentialImpact
    + https://w3id.org/dpv/risk#PotentialImpact
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
    Sub-class of risk-owl:IndividualRisk + dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Psychological HarmIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Core
    - -
    -

    Public Order Breach

    +
    +

    Potential Risk

    - + - + @@ -13029,14 +14895,12 @@

    Public Order Breach

    - @@ -13049,61 +14913,57 @@

    Public Order Breach

    - + - + + + + - - - - + - + - - - - + - +
    TermPublicOrderBreachPotentialRisk Prefix risk-owl
    LabelPublic Order BreachPotential Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PublicOrderBreach
    - https://w3id.org/dpv/risk#PublicOrderBreach + https://w3id.org/dpv/risk/owl/#PotentialRisk
    + https://w3id.org/dpv/risk#PotentialRisk
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
    Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Public Order BreachIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Core
    - -
    -

    Recovery Control

    +
    +

    Potential RiskSource

    - + - + @@ -13112,25 +14972,16 @@

    Recovery Control

    - - - - - + @@ -13139,9 +14990,12 @@

    Recovery Control

    - + - + + + + @@ -13152,13 +15006,16 @@

    Recovery Control

    - + - + + + + - +
    TermRecoveryControlPotentialRiskSource Prefix risk-owl
    LabelRecovery ControlPotential RiskSource
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RecoveryControl
    - https://w3id.org/dpv/risk#RecoveryControl + https://w3id.org/dpv/risk/owl/#PotentialRiskSource
    + https://w3id.org/dpv/risk#PotentialRiskSource
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to recover from eventIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-05-192024-09-29
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Core
    @@ -13166,25 +15023,28 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    + + + +
    +

    Privacy

    - + - + @@ -13193,36 +15053,27 @@

    Reduce Likelihood

    - - - - - + - - - - + @@ -13232,18 +15083,12 @@

    Reduce Likelihood

    - - - - + + - - - - - +
    TermReduceLikelihoodPrivacy Prefix risk-owl
    LabelReduce LikelihoodPrivacy
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReduceLikelihood
    - https://w3id.org/dpv/risk#ReduceLikelihood + https://w3id.org/dpv/risk/owl/#Privacy
    + https://w3id.org/dpv/risk#Privacy
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ReductionControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IndividualRisk
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that reduces the likelihood of an event
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -13251,25 +15096,28 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    + + + +
    +

    Psychological Harm

    - + - + @@ -13278,26 +15126,21 @@

    Reduce Severity

    - - - - - + @@ -13306,29 +15149,35 @@

    Reduce Severity

    - + - + + + + - + - + + + + - +
    TermReduceSeverityPsychologicalHarm Prefix risk-owl
    LabelReduce SeverityPsychological Harm
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReduceSeverity
    - https://w3id.org/dpv/risk#ReduceSeverity + https://w3id.org/dpv/risk/owl/#PsychologicalHarm
    + https://w3id.org/dpv/risk#PsychologicalHarm
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ReductionControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:Harm + → risk-owl:IndividualRisk
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that reduces the severity of an eventSomething that acts as or causes Psychological Harm
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -13336,25 +15185,27 @@

    Reduce Severity

    -
    -

    Reduction Control

    + + +
    +

    Public Order Breach

    - + - + @@ -13363,25 +15214,20 @@

    Reduction Control

    - - - - - + @@ -13390,26 +15236,35 @@

    Reduction Control

    - + - + + + + - + - - + + + + + + + + - +
    TermReductionControlPublicOrderBreach Prefix risk-owl
    LabelReduction ControlPublic Order Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReductionControl
    - https://w3id.org/dpv/risk#ReductionControl + https://w3id.org/dpv/risk/owl/#PublicOrderBreach
    + https://w3id.org/dpv/risk#PublicOrderBreach
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:LegalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or causes Public Order Breach
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -13419,25 +15274,26 @@

    Reduction Control

    -
    -

    Re-identification

    + +
    +

    Racial Discrimination

    - + - + @@ -13446,16 +15302,23 @@

    Re-identification

    - - @@ -13469,12 +15332,9 @@

    Re-identification

    - + - - - - + @@ -13485,19 +15345,13 @@

    Re-identification

    - + - - - - - - - - + + - +
    TermReidentificationRacialDiscrimination Prefix risk-owl
    LabelRe-identificationRacial Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Reidentification
    - https://w3id.org/dpv/risk#Reidentification + https://w3id.org/dpv/risk/owl/#RacialDiscrimination
    + https://w3id.org/dpv/risk#RacialDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:ConfidentialityConcept + risk-owl:Racism + → risk-owl:Discrimination + → risk-owl:RiskConcept
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:Racism + → risk-owl:Discrimination + → risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Re-identificationDiscrimination against individuals because of their racial background or skin color
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-192024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -13505,25 +15359,28 @@

    Re-identification

    -
    -

    Remedy Control

    + + + +
    +

    Racism

    - + - + @@ -13532,25 +15389,26 @@

    Remedy Control

    - + + - - - - + @@ -13559,7 +15417,7 @@

    Remedy Control

    - + @@ -13572,13 +15430,13 @@

    Remedy Control

    - + - +
    TermRemedyControlRacism Prefix risk-owl
    LabelRemedy ControlRacism
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemedyControl
    - https://w3id.org/dpv/risk#RemedyControl + https://w3id.org/dpv/risk/owl/#Racism
    + https://w3id.org/dpv/risk#Racism
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to remedy consequences of eventPrejudice or discrimination against people based on their race
    Date Created2024-05-192024-09-30
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -13586,25 +15444,25 @@

    Remedy Control

    -
    -

    Remove Consequence

    +
    +

    Recovery Control

    - + - + @@ -13619,8 +15477,7 @@

    Remove Consequence

    - @@ -13641,7 +15498,7 @@

    Remove Consequence

    - + @@ -13657,10 +15514,7 @@

    Remove Consequence

    - - - - + @@ -13671,25 +15525,25 @@

    Remove Consequence

    -
    -

    Remove Impact

    +
    +

    Reduce Likelihood

    TermRemoveConsequenceRecoveryControl Prefix risk-owl
    LabelRemove ConsequenceRecovery Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveConsequence
    - https://w3id.org/dpv/risk#RemoveConsequence + https://w3id.org/dpv/risk/owl/#RecoveryControl
    + https://w3id.org/dpv/risk#RecoveryControl
    Sub-class of risk-owl:ConsequenceControl - → risk-owl:RiskControl + risk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure
    DefinitionControl that removes Consequence i.e. prevents it from materialisingControl to recover from event
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-controls
    - + - + @@ -13704,7 +15558,7 @@

    Remove Impact

    - - + @@ -13756,25 +15610,25 @@

    Remove Impact

    -
    -

    Remove Source

    +
    +

    Reduce Severity

    TermRemoveImpactReduceLikelihood Prefix risk-owl
    LabelRemove ImpactReduce Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveImpact
    - https://w3id.org/dpv/risk#RemoveImpact + https://w3id.org/dpv/risk/owl/#ReduceLikelihood
    + https://w3id.org/dpv/risk#ReduceLikelihood
    Sub-class of risk-owl:ImpactControl + risk-owl:ReductionControlrisk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure @@ -13726,7 +15580,7 @@

    Remove Impact

    DefinitionControl that removes Impact i.e. prevents it from materialisingControl that reduces the likelihood of an event
    - + - + @@ -13789,7 +15643,7 @@

    Remove Source

    - - + @@ -13841,25 +15695,25 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Reduction Control

    TermRemoveSourceReduceSeverity Prefix risk-owl
    LabelRemove SourceReduce Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveSource
    - https://w3id.org/dpv/risk#RemoveSource + https://w3id.org/dpv/risk/owl/#ReduceSeverity
    + https://w3id.org/dpv/risk#ReduceSeverity
    Sub-class of risk-owl:SourceControl + risk-owl:ReductionControlrisk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure @@ -13811,7 +15665,7 @@

    Remove Source

    DefinitionControl that removes the risk sourceControl that reduces the severity of an event
    - + - + @@ -13868,18 +15722,25 @@

    Remuneration

    - - + + + + @@ -13888,7 +15749,7 @@

    Remuneration

    - + @@ -13901,19 +15762,13 @@

    Remuneration

    - + - - - - - - - - + + - +
    TermRenumerationReductionControl Prefix risk-owl
    LabelRemunerationReduction Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Renumeration
    - https://w3id.org/dpv/risk#Renumeration + https://w3id.org/dpv/risk/owl/#ReductionControl
    + https://w3id.org/dpv/risk#ReductionControl
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formControl that reduces the likelihood or severity of an event
    Date Created2024-04-142024-05-19
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -13921,25 +15776,31 @@

    Remuneration

    -
    -

    Reputational Risk

    + + + + + + +
    +

    Re-identification

    - + - + @@ -13949,12 +15810,17 @@

    Reputational Risk

    - @@ -13967,9 +15833,12 @@

    Reputational Risk

    - + - + + + + @@ -13978,12 +15847,21 @@

    Reputational Risk

    - - - + + + + + + + + + + + + - +
    TermReputationalRiskReidentification Prefix risk-owl
    LabelReputational RiskRe-identification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReputationalRisk
    - https://w3id.org/dpv/risk#ReputationalRisk + https://w3id.org/dpv/risk/owl/#Reidentification
    + https://w3id.org/dpv/risk#Reidentification
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of dpv-owl:RiskConcept + risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
    DefinitionRisks and issues that affect the reputation of the organisationSomething that acts as or causes Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -13991,25 +15869,28 @@

    Reputational Risk

    -
    -

    Requirements Bias

    + + + +
    +

    Religious Discrimination

    - + - + @@ -14018,15 +15899,22 @@

    Requirements Bias

    - + + @@ -14039,35 +15927,26 @@

    Requirements Bias

    - + - - - - + - - - - + - + - - - - + - +
    TermRequirementsBiasReligiousDiscrimination Prefix risk-owl
    LabelRequirements BiasReligious Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RequirementsBias
    - https://w3id.org/dpv/risk#RequirementsBias + https://w3id.org/dpv/risk/owl/#ReligiousDiscrimination
    + https://w3id.org/dpv/risk#ReligiousDiscrimination
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk , risk-owl:RiskConcept
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias + risk-owl:Discriminationrisk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionBias that occurs in or during requirements creationDiscrimination based on a person's religious beliefs or practices
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -14075,25 +15954,25 @@

    Requirements Bias

    -
    -

    Reward

    +
    +

    Remedy Control

    - + - + @@ -14102,18 +15981,25 @@

    Reward

    - - + + + + @@ -14122,7 +16008,7 @@

    Reward

    - + @@ -14135,19 +16021,13 @@

    Reward

    - + - - - - - - - - + + - +
    TermRewardRemedyControl Prefix risk-owl
    LabelRewardRemedy Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Reward
    - https://w3id.org/dpv/risk#Reward + https://w3id.org/dpv/risk/owl/#RemedyControl
    + https://w3id.org/dpv/risk#RemedyControl
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeControl to remedy consequences of event
    Date Created2024-04-142024-05-19
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -14155,25 +16035,25 @@

    Reward

    -
    -

    Prevent Exercising of Rights

    +
    +

    Remove Consequence

    - + - + @@ -14182,18 +16062,26 @@

    Prevent Exercising of Rights

    - - + + + + @@ -14202,12 +16090,9 @@

    Prevent Exercising of Rights

    - + - - - - + @@ -14218,19 +16103,16 @@

    Prevent Exercising of Rights

    - + - - - - + - + - +
    TermRightsExercisePreventionRemoveConsequence Prefix risk-owl
    LabelPrevent Exercising of RightsRemove Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsExercisePrevention
    - https://w3id.org/dpv/risk#RightsExercisePrevention + https://w3id.org/dpv/risk/owl/#RemoveConsequence
    + https://w3id.org/dpv/risk#RemoveConsequence
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:ConsequenceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or causes Prevent Exercising of RightsControl that removes Consequence i.e. prevents it from materialising
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Date Created2022-08-182024-05-19
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -14238,25 +16120,25 @@

    Prevent Exercising of Rights

    -
    -

    Impact to Rights

    +
    +

    Remove Impact

    - + - + @@ -14265,26 +16147,24 @@

    Impact to Rights

    - - - - @@ -14295,38 +16175,29 @@

    Impact to Rights

    - + - - - - + - - - - + - + - - - - + - +
    TermRightsImpactRemoveImpact Prefix risk-owl
    LabelImpact to RightsRemove Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsImpact
    - https://w3id.org/dpv/risk#RightsImpact + https://w3id.org/dpv/risk/owl/#RemoveImpact
    + https://w3id.org/dpv/risk#RemoveImpact
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of dpv-owl:Impact - → dpv-owl:Consequence - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:ImpactControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasConsequence, - dpv-owl:hasImpact + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionSomething that acts as or causes Impact to RightsControl that removes Impact i.e. prevents it from materialising
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -14334,25 +16205,25 @@

    Impact to Rights

    -
    -

    Limitation of Rights

    +
    +

    Remove Source

    - + - + @@ -14361,18 +16232,26 @@

    Limitation of Rights

    - - + + + + @@ -14381,12 +16260,9 @@

    Limitation of Rights

    - + - - - - + @@ -14397,19 +16273,16 @@

    Limitation of Rights

    - + - - - - + - + - +
    TermRightsLimitationRemoveSource Prefix risk-owl
    LabelLimitation of RightsRemove Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsLimitation
    - https://w3id.org/dpv/risk#RightsLimitation + https://w3id.org/dpv/risk/owl/#RemoveSource
    + https://w3id.org/dpv/risk#RemoveSource
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:SourceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or causes Limitation of RightsControl that removes the risk source
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Date Created2022-08-182024-05-19
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -14417,25 +16290,28 @@

    Limitation of Rights

    -
    -

    Violation of Rights

    + + + +
    +

    Remuneration

    - + - + @@ -14445,12 +16321,15 @@

    Violation of Rights

    - @@ -14464,12 +16343,9 @@

    Violation of Rights

    - + - - - - + @@ -14480,7 +16356,7 @@

    Violation of Rights

    - + @@ -14492,36 +16368,36 @@

    Violation of Rights

    - +
    TermRightsViolationRenumeration Prefix risk-owl
    LabelViolation of RightsRemuneration
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsViolation
    - https://w3id.org/dpv/risk#RightsViolation + https://w3id.org/dpv/risk/owl/#Renumeration
    + https://w3id.org/dpv/risk#Renumeration
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:SocietalRisk + risk-owl:FinancialImpactdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of RightsSomething that acts as or provides renumeration which is in monetary or financial form
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    Date Created2022-08-182024-04-14
    Date Modified
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    - - - - -
    -

    Risk Analysis

    + + + + +
    +

    Reputational Risk

    - + - + @@ -14530,13 +16406,16 @@

    Risk Analysis

    - @@ -14549,57 +16428,52 @@

    Risk Analysis

    - + - - - - + - - - - + + - - - - - +
    TermRiskAnalysisReputationalRisk Prefix risk-owl
    LabelRisk AnalysisReputational Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskAnalysis
    - https://w3id.org/dpv/risk#RiskAnalysis + https://w3id.org/dpv/risk/owl/#ReputationalRisk
    + https://w3id.org/dpv/risk#ReputationalRisk
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskAssessment - → risk-owl:RiskManagement + dpv-owl:RiskConcept
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresRisks and issues that affect the reputation of the organisation
    SourceIEC 31010:2019
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    -
    -

    Risk Assessment

    + + + + +
    +

    Requirements Bias

    - + - + @@ -14608,12 +16482,18 @@

    Risk Assessment

    - @@ -14626,9 +16506,12 @@

    Risk Assessment

    - + - + + + + @@ -14642,38 +16525,45 @@

    Risk Assessment

    - + - + + + + - +
    TermRiskAssessmentRequirementsBias Prefix risk-owl
    LabelRisk AssessmentRequirements Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskAssessment
    - https://w3id.org/dpv/risk#RiskAssessment + https://w3id.org/dpv/risk/owl/#RequirementsBias
    + https://w3id.org/dpv/risk#RequirementsBias
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskManagement + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
    DefinitionAssessment of risk involving its identification, analysis, and evaluationBias that occurs in or during requirements creation
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Date Created2024-02-142024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    -
    -

    Risk Control

    + + + + +
    +

    Reverse Discrimination

    - + - + @@ -14682,23 +16572,26 @@

    Risk Control

    - + + - - - - + @@ -14707,14 +16600,10 @@

    Risk Control

    - + - - - @@ -14724,38 +16613,42 @@

    Risk Control

    - + - +
    TermRiskControlReverseDiscrimination Prefix risk-owl
    LabelRisk ControlReverse Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskControl
    - https://w3id.org/dpv/risk#RiskControl + https://w3id.org/dpv/risk/owl/#ReverseDiscrimination
    + https://w3id.org/dpv/risk#ReverseDiscrimination
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that modifies riskDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    Examples Using risk controls to express how tech/org measures address the risk (E0071) -
    Date Created2024-05-192024-09-30
    Documented inDex Risk-controlsRisk Risk-taxonomy
    -
    -

    Risk Management

    + + + + +
    +

    Reward

    - + - + @@ -14764,10 +16657,19 @@

    Risk Management

    - + + + @@ -14779,29 +16681,32 @@

    Risk Management

    - + - - - - + - + - - + + + + + + + + - +
    TermRiskManagementReward Prefix risk-owl
    LabelRisk ManagementReward
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskManagement
    - https://w3id.org/dpv/risk#RiskManagement + https://w3id.org/dpv/risk/owl/#Reward
    + https://w3id.org/dpv/risk#Reward
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:Renumeration + → risk-owl:FinancialImpact + → dpv-owl:RiskConcept +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Source
    Date Created2024-06-122024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    @@ -14809,25 +16714,28 @@

    Risk Management

    -
    -

    Risk Matrix

    + + + +
    +

    Erosion of Rights

    - + - + @@ -14836,14 +16744,18 @@

    Risk Matrix

    - @@ -14856,32 +16768,26 @@

    Risk Matrix

    - + - + + + + - - - - + - - - - + + - - - - - +
    TermRiskMatrixRightEroded Prefix risk-owl
    LabelRisk MatrixErosion of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix
    - https://w3id.org/dpv/risk#RiskMatrix + https://w3id.org/dpv/risk/owl/#RightEroded
    + https://w3id.org/dpv/risk#RightEroded
    Type rdfs:Class , owl:Class - , risk-owl:RiskAssessment + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RightsImpact + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.The gradual weakening or reduction of the scope and protection of rights
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceIEC 31010:2019
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    @@ -14889,25 +16795,28 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    + + + +
    +

    Obstruction of Rights

    - + - + @@ -14916,15 +16825,18 @@

    Risk Matrix 3x3

    - @@ -14937,9 +16849,12 @@

    Risk Matrix 3x3

    - + - + + + + @@ -14948,18 +16863,12 @@

    Risk Matrix 3x3

    - - - - + + - - - - - +
    TermRiskMatrix3x3RightObstructed Prefix risk-owl
    LabelRisk Matrix 3x3Obstruction of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix3x3
    - https://w3id.org/dpv/risk#RiskMatrix3x3 + https://w3id.org/dpv/risk/owl/#RightObstructed
    + https://w3id.org/dpv/risk#RightObstructed
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RightsImpact + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -14967,25 +16876,28 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    + + + +
    +

    Denial of Rights

    - + - + @@ -14994,15 +16906,18 @@

    Risk Matrix 5x5

    - @@ -15015,9 +16930,12 @@

    Risk Matrix 5x5

    - + - + + + + @@ -15026,18 +16944,12 @@

    Risk Matrix 5x5

    - - - - + + - - - - - +
    TermRiskMatrix5x5RightsDenial Prefix risk-owl
    LabelRisk Matrix 5x5Denial of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix5x5
    - https://w3id.org/dpv/risk#RiskMatrix5x5 + https://w3id.org/dpv/risk/owl/#RightsDenial
    + https://w3id.org/dpv/risk#RightsDenial
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RightsImpact + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -15045,25 +16957,28 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    + + + +
    +

    Prevent Exercising of Rights

    - + - + @@ -15072,15 +16987,18 @@

    Risk Matrix 7x7

    - @@ -15093,9 +17011,12 @@

    Risk Matrix 7x7

    - + - + + + + @@ -15106,41 +17027,48 @@

    Risk Matrix 7x7

    - + - + + + + - + - +
    TermRiskMatrix7x7RightsExercisePrevention Prefix risk-owl
    LabelRisk Matrix 7x7Prevent Exercising of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix7x7
    - https://w3id.org/dpv/risk#RiskMatrix7x7 + https://w3id.org/dpv/risk/owl/#RightsExercisePrevention
    + https://w3id.org/dpv/risk#RightsExercisePrevention
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RightsImpact + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    -
    -

    Risk Source

    + + + + +
    +

    Impact to Rights

    - + - + @@ -15149,20 +17077,21 @@

    Risk Source

    - - - - - + @@ -15171,29 +17100,38 @@

    Risk Source

    - + - + + + + - + + + + - + - + + + + - +
    TermRiskSourceRightsImpact Prefix risk-owl
    LabelRisk SourceImpact to Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskSource
    - https://w3id.org/dpv/risk#RiskSource + https://w3id.org/dpv/risk/owl/#RightsImpact
    + https://w3id.org/dpv/risk#RightsImpact
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of dpv-owl:RiskConcept + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    in Range of risk-owl:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified 2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    @@ -15201,25 +17139,28 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    + + + +
    +

    Limitation of Rights

    - + - + @@ -15228,16 +17169,18 @@

    Low Risk (RM3x3 S:1 L:1)

    - @@ -15250,9 +17193,12 @@

    Low Risk (RM3x3 S:1 L:1)

    - + - + + + + @@ -15263,16 +17209,19 @@

    Low Risk (RM3x3 S:1 L:1)

    - + - + + + + - + - +
    TermRM3x3S1L1RightsLimitation Prefix risk-owl
    LabelLow Risk (RM3x3 S:1 L:1)Limitation of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L1
    - https://w3id.org/dpv/risk#RM3x3S1L1 + https://w3id.org/dpv/risk/owl/#RightsLimitation
    + https://w3id.org/dpv/risk#RightsLimitation
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RightsImpact + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -15280,25 +17229,28 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    + + + +
    +

    Unfulfilment of Rights

    - + - + @@ -15307,16 +17259,18 @@

    Low Risk (RM3x3 S:1 L:2)

    - @@ -15329,9 +17283,12 @@

    Low Risk (RM3x3 S:1 L:2)

    - + - + + + + @@ -15340,18 +17297,12 @@

    Low Risk (RM3x3 S:1 L:2)

    - - - - + + - - - - - +
    TermRM3x3S1L2RightsUnfulfilled Prefix risk-owl
    LabelLow Risk (RM3x3 S:1 L:2)Unfulfilment of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L2
    - https://w3id.org/dpv/risk#RM3x3S1L2 + https://w3id.org/dpv/risk/owl/#RightsUnfulfilled
    + https://w3id.org/dpv/risk#RightsUnfulfilled
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RightsImpact + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowFailure to meet or complete the fulfilment of rights
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -15359,25 +17310,28 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    + + + +
    +

    Violation of Rights

    - + - + @@ -15386,16 +17340,18 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - @@ -15408,9 +17364,12 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - + - + + + + @@ -15421,42 +17380,48 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - + - + + + + - + - +
    TermRM3x3S1L3RightsViolation Prefix risk-owl
    LabelModerate Risk (RM3x3 S:1 L:3)Violation of Rights
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L3
    - https://w3id.org/dpv/risk#RM3x3S1L3 + https://w3id.org/dpv/risk/owl/#RightsViolation
    + https://w3id.org/dpv/risk#RightsViolation
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RightsImpact + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    + + + + - -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Risk Analysis

    - + - + @@ -15465,15 +17430,12 @@

    Low Risk (RM3x3 S:2 L:1)

    - @@ -15487,20 +17449,23 @@

    Low Risk (RM3x3 S:2 L:1)

    - + - + + + + - + @@ -15509,33 +17474,32 @@

    Low Risk (RM3x3 S:2 L:1)

    - +
    TermRM3x3S2L1RiskAnalysis Prefix risk-owl
    LabelLow Risk (RM3x3 S:2 L:1)Risk Analysis
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L1
    - https://w3id.org/dpv/risk#RM3x3S2L1 + https://w3id.org/dpv/risk/owl/#RiskAnalysis
    + https://w3id.org/dpv/risk#RiskAnalysis
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment + risk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-172022-08-18
    Documented inRisk Risk-matrixRisk Core
    - -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Risk Assessment

    - + - + @@ -15544,16 +17508,12 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - @@ -15566,55 +17526,54 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - + - + + + + - + - - - - + - +
    TermRM3x3S2L2RiskAssessment Prefix risk-owl
    LabelModerate Risk (RM3x3 S:2 L:2)Risk Assessment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L2
    - https://w3id.org/dpv/risk#RM3x3S2L2 + https://w3id.org/dpv/risk/owl/#RiskAssessment
    + https://w3id.org/dpv/risk#RiskAssessment
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateAssessment of risk involving its identification, analysis, and evaluation
    Source
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Core
    - -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Risk Control

    - + - + @@ -15623,20 +17582,23 @@

    High Risk (RM3x3 S:2 L:3)

    - - + + + + @@ -15645,10 +17607,14 @@

    High Risk (RM3x3 S:2 L:3)

    - + + + + @@ -15658,42 +17624,38 @@

    High Risk (RM3x3 S:2 L:3)

    - + - - - - + - +
    TermRM3x3S2L3RiskControl Prefix risk-owl
    LabelHigh Risk (RM3x3 S:2 L:3)Risk Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L3
    - https://w3id.org/dpv/risk#RM3x3S2L3 + https://w3id.org/dpv/risk/owl/#RiskControl
    + https://w3id.org/dpv/risk#RiskControl
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighControl that modifies risk
    Examples Using risk controls to express how tech/org measures address the risk (E0071) +
    Date Created2022-08-172024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixDex Risk-controls
    - -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Risk Management

    - + - + @@ -15702,17 +17664,10 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - - + @@ -15724,29 +17679,29 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - + - + + + + - + - - - - + - +
    TermRM3x3S3L1RiskManagement Prefix risk-owl
    LabelModerate Risk (RM3x3 S:3 L:1)Risk Management
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L1
    - https://w3id.org/dpv/risk#RM3x3S3L1 + https://w3id.org/dpv/risk/owl/#RiskManagement
    + https://w3id.org/dpv/risk#RiskManagement
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement -
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2022-08-172024-06-12
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Core
    @@ -15754,25 +17709,25 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Risk Matrix

    - + - + @@ -15781,15 +17736,13 @@

    High Risk (RM3x3 S:3 L:2)

    - @@ -15803,20 +17756,23 @@

    High Risk (RM3x3 S:3 L:2)

    - + - + + + + - + @@ -15825,7 +17781,7 @@

    High Risk (RM3x3 S:3 L:2)

    - +
    TermRM3x3S3L2RiskMatrix Prefix risk-owl
    LabelHigh Risk (RM3x3 S:3 L:2)Risk Matrix
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L2
    - https://w3id.org/dpv/risk#RM3x3S3L2 + https://w3id.org/dpv/risk/owl/#RiskMatrix
    + https://w3id.org/dpv/risk#RiskMatrix
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , risk-owl:RiskAssessment
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment + risk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2022-08-172024-02-14
    Documented inRisk Risk-matrixRisk Core
    @@ -15833,25 +17789,25 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Risk Matrix 3x3

    - + - + @@ -15866,8 +17822,7 @@

    High Risk (RM3x3 S:3 L:3)

    - @@ -15882,7 +17837,7 @@

    High Risk (RM3x3 S:3 L:3)

    - + @@ -15912,25 +17867,25 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Risk Matrix 5x5

    TermRM3x3S3L3RiskMatrix3x3 Prefix risk-owl
    LabelHigh Risk (RM3x3 S:3 L:3)Risk Matrix 3x3
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L3
    - https://w3id.org/dpv/risk#RM3x3S3L3 + https://w3id.org/dpv/risk/owl/#RiskMatrix3x3
    + https://w3id.org/dpv/risk#RiskMatrix3x3
    Sub-class of risk-owl:RiskMatrix3x3 - → risk-owl:RiskMatrix + risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    - + - + @@ -15945,8 +17900,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - @@ -15961,7 +17915,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -15991,25 +17945,25 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    Risk Matrix 7x7

    TermRM5x5S1L1RiskMatrix5x5 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:1)Risk Matrix 5x5
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L1
    - https://w3id.org/dpv/risk#RM5x5S1L1 + https://w3id.org/dpv/risk/owl/#RiskMatrix5x5
    + https://w3id.org/dpv/risk#RiskMatrix5x5
    Sub-class of risk-owl:RiskMatrix5x5 - → risk-owl:RiskMatrix + risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    - + - + @@ -16024,8 +17978,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - @@ -16040,7 +17993,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -16069,26 +18022,25 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Risk Source

    TermRM5x5S1L2RiskMatrix7x7 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:2)Risk Matrix 7x7
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L2
    - https://w3id.org/dpv/risk#RM5x5S1L2 + https://w3id.org/dpv/risk/owl/#RiskMatrix7x7
    + https://w3id.org/dpv/risk#RiskMatrix7x7
    Sub-class of risk-owl:RiskMatrix5x5 - → risk-owl:RiskMatrix + risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    - + - + @@ -16097,20 +18049,20 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - - + + + + @@ -16119,7 +18071,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -16132,16 +18084,16 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + - - - + + + - +
    TermRM5x5S1L3RiskSource Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:3)Risk Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L3
    - https://w3id.org/dpv/risk#RM5x5S1L3 + https://w3id.org/dpv/risk/owl/#RiskSource
    + https://w3id.org/dpv/risk#RiskSource
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix5x5 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + dpv-owl:RiskConcept
    in Range of risk-owl:hasRiskSource +
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2022-08-172024-02-14
    ContributorsHarshvardhan J. PanditDate Modified2024-08-16
    Documented inRisk Risk-matrixRisk Core
    @@ -16149,25 +18101,25 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    - + - + @@ -16182,7 +18134,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - - + @@ -16228,25 +18180,25 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRM5x5S1L4RM3x3S1L1 Prefix risk-owl
    LabelLow Risk (RM5x5 S:1 L:4)Low Risk (RM3x3 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L4
    - https://w3id.org/dpv/risk#RM5x5S1L4 + https://w3id.org/dpv/risk/owl/#RM3x3S1L1
    + https://w3id.org/dpv/risk#RM3x3S1L1
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16198,7 +18150,7 @@

    Low Risk (RM5x5 S:1 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + @@ -16261,7 +18213,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - - + @@ -16307,26 +18259,26 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRM5x5S1L5RM3x3S1L2 Prefix risk-owl
    LabelLow Risk (RM5x5 S:1 L:5)Low Risk (RM3x3 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L5
    - https://w3id.org/dpv/risk#RM5x5S1L5 + https://w3id.org/dpv/risk/owl/#RM3x3S1L2
    + https://w3id.org/dpv/risk#RM3x3S1L2
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16277,7 +18229,7 @@

    Low Risk (RM5x5 S:1 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    - + - + + https://w3id.org/dpv/risk/owl/#RM3x3S1L3
    + https://w3id.org/dpv/risk#RM3x3S1L3 + @@ -16340,7 +18292,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - - + @@ -16386,25 +18338,25 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRM5x5S2L1RM3x3S1L3 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:2 L:1)Moderate Risk (RM3x3 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L1
    - https://w3id.org/dpv/risk#RM5x5S2L1 -
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16356,7 +18308,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + @@ -16419,7 +18371,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - - + @@ -16465,25 +18417,25 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRM5x5S2L2RM3x3S2L1 Prefix risk-owl
    LabelLow Risk (RM5x5 S:2 L:2)Low Risk (RM3x3 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L2
    - https://w3id.org/dpv/risk#RM5x5S2L2 + https://w3id.org/dpv/risk/owl/#RM3x3S2L1
    + https://w3id.org/dpv/risk#RM3x3S2L1
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16435,7 +18387,7 @@

    Low Risk (RM5x5 S:2 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    - + - + @@ -16498,7 +18450,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - - + @@ -16544,25 +18496,25 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRM5x5S2L3RM3x3S2L2 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM3x3 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L3
    - https://w3id.org/dpv/risk#RM5x5S2L3 + https://w3id.org/dpv/risk/owl/#RM3x3S2L2
    + https://w3id.org/dpv/risk#RM3x3S2L2
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16514,7 +18466,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -16577,7 +18529,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - - + @@ -16623,25 +18575,25 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRM5x5S2L4RM3x3S2L3 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM3x3 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L4
    - https://w3id.org/dpv/risk#RM5x5S2L4 + https://w3id.org/dpv/risk/owl/#RM3x3S2L3
    + https://w3id.org/dpv/risk#RM3x3S2L3
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16593,7 +18545,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + @@ -16656,7 +18608,7 @@

    High Risk (RM5x5 S:2 L:5)

    - - + @@ -16702,25 +18654,25 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRM5x5S2L5RM3x3S3L1 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:2 L:5)Moderate Risk (RM3x3 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L5
    - https://w3id.org/dpv/risk#RM5x5S2L5 + https://w3id.org/dpv/risk/owl/#RM3x3S3L1
    + https://w3id.org/dpv/risk#RM3x3S3L1
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16672,7 +18624,7 @@

    High Risk (RM5x5 S:2 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -16735,7 +18687,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - - + @@ -16781,25 +18733,25 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRM5x5S3L1RM3x3S3L2 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:3 L:1)High Risk (RM3x3 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L1
    - https://w3id.org/dpv/risk#RM5x5S3L1 + https://w3id.org/dpv/risk/owl/#RM3x3S3L2
    + https://w3id.org/dpv/risk#RM3x3S3L2
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16751,7 +18703,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -16814,7 +18766,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - - + @@ -16860,25 +18812,25 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRM5x5S3L2RM3x3S3L3 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:3 L:2)High Risk (RM3x3 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L2
    - https://w3id.org/dpv/risk#RM5x5S3L2 + https://w3id.org/dpv/risk/owl/#RM3x3S3L3
    + https://w3id.org/dpv/risk#RM3x3S3L3
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix3x3risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16830,7 +18782,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    - + - + @@ -16909,7 +18861,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -16939,25 +18891,25 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM5x5S3L3RM5x5S1L1 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:3 L:3)Very Low Risk (RM5x5 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L3
    - https://w3id.org/dpv/risk#RM5x5S3L3 + https://w3id.org/dpv/risk/owl/#RM5x5S1L1
    + https://w3id.org/dpv/risk#RM5x5S1L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -16988,7 +18940,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -17018,25 +18970,25 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM5x5S3L4RM5x5S1L2 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:3 L:4)Very Low Risk (RM5x5 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L4
    - https://w3id.org/dpv/risk#RM5x5S3L4 + https://w3id.org/dpv/risk/owl/#RM5x5S1L2
    + https://w3id.org/dpv/risk#RM5x5S1L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + @@ -17067,7 +19019,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -17097,25 +19049,25 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM5x5S3L5RM5x5S1L3 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:3 L:5)Very Low Risk (RM5x5 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L5
    - https://w3id.org/dpv/risk#RM5x5S3L5 + https://w3id.org/dpv/risk/owl/#RM5x5S1L3
    + https://w3id.org/dpv/risk#RM5x5S1L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + @@ -17146,7 +19098,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -17176,25 +19128,25 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM5x5S4L1RM5x5S1L4 Prefix risk-owl
    LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM5x5 S:1 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L1
    - https://w3id.org/dpv/risk#RM5x5S4L1 + https://w3id.org/dpv/risk/owl/#RM5x5S1L4
    + https://w3id.org/dpv/risk#RM5x5S1L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + @@ -17225,7 +19177,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - + @@ -17255,25 +19207,25 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM5x5S4L2RM5x5S1L5 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:4 L:2)Low Risk (RM5x5 S:1 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L2
    - https://w3id.org/dpv/risk#RM5x5S4L2 + https://w3id.org/dpv/risk/owl/#RM5x5S1L5
    + https://w3id.org/dpv/risk#RM5x5S1L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + @@ -17304,7 +19256,7 @@

    High Risk (RM5x5 S:4 L:3)

    - + @@ -17334,25 +19286,25 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM5x5S4L3RM5x5S2L1 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:4 L:3)Very Low Risk (RM5x5 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L3
    - https://w3id.org/dpv/risk#RM5x5S4L3 + https://w3id.org/dpv/risk/owl/#RM5x5S2L1
    + https://w3id.org/dpv/risk#RM5x5S2L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -17383,7 +19335,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - + @@ -17413,25 +19365,25 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM5x5S4L4RM5x5S2L2 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:4 L:4)Low Risk (RM5x5 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L4
    - https://w3id.org/dpv/risk#RM5x5S4L4 + https://w3id.org/dpv/risk/owl/#RM5x5S2L2
    + https://w3id.org/dpv/risk#RM5x5S2L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + @@ -17462,7 +19414,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - + @@ -17492,25 +19444,25 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM5x5S4L5RM5x5S2L3 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:4 L:5)Moderate Risk (RM5x5 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L5
    - https://w3id.org/dpv/risk#RM5x5S4L5 + https://w3id.org/dpv/risk/owl/#RM5x5S2L3
    + https://w3id.org/dpv/risk#RM5x5S2L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -17541,7 +19493,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - + @@ -17571,25 +19523,25 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM5x5S5L1RM5x5S2L4 Prefix risk-owl
    LabelLow Risk (RM5x5 S:5 L:1)Moderate Risk (RM5x5 S:2 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L1
    - https://w3id.org/dpv/risk#RM5x5S5L1 + https://w3id.org/dpv/risk/owl/#RM5x5S2L4
    + https://w3id.org/dpv/risk#RM5x5S2L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + @@ -17620,7 +19572,7 @@

    High Risk (RM5x5 S:5 L:2)

    - + @@ -17650,25 +19602,25 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S5L2RM5x5S2L5 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:5 L:2)High Risk (RM5x5 S:2 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L2
    - https://w3id.org/dpv/risk#RM5x5S5L2 + https://w3id.org/dpv/risk/owl/#RM5x5S2L5
    + https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + @@ -17699,7 +19651,7 @@

    High Risk (RM5x5 S:5 L:3)

    - + @@ -17729,25 +19681,25 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S5L3RM5x5S3L1 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:5 L:3)Very Low Risk (RM5x5 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L3
    - https://w3id.org/dpv/risk#RM5x5S5L3 + https://w3id.org/dpv/risk/owl/#RM5x5S3L1
    + https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -17778,7 +19730,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - + @@ -17808,25 +19760,25 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S5L4RM5x5S3L2 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:5 L:4)Moderate Risk (RM5x5 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L4
    - https://w3id.org/dpv/risk#RM5x5S5L4 + https://w3id.org/dpv/risk/owl/#RM5x5S3L2
    + https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -17857,7 +19809,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - + @@ -17887,25 +19839,25 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S5L5RM5x5S3L3 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:5 L:5)Moderate Risk (RM5x5 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L5
    - https://w3id.org/dpv/risk#RM5x5S5L5 + https://w3id.org/dpv/risk/owl/#RM5x5S3L3
    + https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -17920,7 +19872,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - - + @@ -17966,25 +19918,25 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM7x7S1L1RM5x5S3L4 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:1)High Risk (RM5x5 S:3 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L1
    - https://w3id.org/dpv/risk#RM7x7S1L1 + https://w3id.org/dpv/risk/owl/#RM5x5S3L4
    + https://w3id.org/dpv/risk#RM5x5S3L4
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -17936,7 +19888,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + @@ -17999,7 +19951,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - - + @@ -18045,25 +19997,25 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM7x7S1L2RM5x5S3L5 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Very High Risk (RM5x5 S:3 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L2
    - https://w3id.org/dpv/risk#RM7x7S1L2 + https://w3id.org/dpv/risk/owl/#RM5x5S3L5
    + https://w3id.org/dpv/risk#RM5x5S3L5
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18015,7 +19967,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -18078,7 +20030,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - - + @@ -18124,25 +20076,25 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM7x7S1L3RM5x5S4L1 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Low Risk (RM5x5 S:4 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L3
    - https://w3id.org/dpv/risk#RM7x7S1L3 + https://w3id.org/dpv/risk/owl/#RM5x5S4L1
    + https://w3id.org/dpv/risk#RM5x5S4L1
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18094,7 +20046,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -18157,7 +20109,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - - + @@ -18203,25 +20155,25 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM7x7S1L4RM5x5S4L2 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM5x5 S:4 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L4
    - https://w3id.org/dpv/risk#RM7x7S1L4 + https://w3id.org/dpv/risk/owl/#RM5x5S4L2
    + https://w3id.org/dpv/risk#RM5x5S4L2
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18173,7 +20125,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -18236,7 +20188,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - - + @@ -18282,25 +20234,25 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM7x7S1L5RM5x5S4L3 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:5)High Risk (RM5x5 S:4 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L5
    - https://w3id.org/dpv/risk#RM7x7S1L5 + https://w3id.org/dpv/risk/owl/#RM5x5S4L3
    + https://w3id.org/dpv/risk#RM5x5S4L3
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18252,7 +20204,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -18315,7 +20267,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - - + @@ -18361,25 +20313,25 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM7x7S1L6RM5x5S4L4 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:6)Very High Risk (RM5x5 S:4 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L6
    - https://w3id.org/dpv/risk#RM7x7S1L6 + https://w3id.org/dpv/risk/owl/#RM5x5S4L4
    + https://w3id.org/dpv/risk#RM5x5S4L4
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18331,7 +20283,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -18394,7 +20346,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - - + @@ -18440,25 +20392,25 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM7x7S1L7RM5x5S4L5 Prefix risk-owl
    LabelLow Risk (RM7x7 S:1 L:7)Very High Risk (RM5x5 S:4 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L7
    - https://w3id.org/dpv/risk#RM7x7S1L7 + https://w3id.org/dpv/risk/owl/#RM5x5S4L5
    + https://w3id.org/dpv/risk#RM5x5S4L5
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18410,7 +20362,7 @@

    Low Risk (RM7x7 S:1 L:7)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -18473,7 +20425,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - - + @@ -18519,25 +20471,25 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM7x7S2L1RM5x5S5L1 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Low Risk (RM5x5 S:5 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L1
    - https://w3id.org/dpv/risk#RM7x7S2L1 + https://w3id.org/dpv/risk/owl/#RM5x5S5L1
    + https://w3id.org/dpv/risk#RM5x5S5L1
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18489,7 +20441,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -18552,7 +20504,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - - + @@ -18598,25 +20550,25 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM7x7S2L2RM5x5S5L2 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:2 L:2)High Risk (RM5x5 S:5 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L2
    - https://w3id.org/dpv/risk#RM7x7S2L2 + https://w3id.org/dpv/risk/owl/#RM5x5S5L2
    + https://w3id.org/dpv/risk#RM5x5S5L2
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18568,7 +20520,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + @@ -18631,7 +20583,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - - + @@ -18677,25 +20629,25 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM7x7S2L3RM5x5S5L3 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:2 L:3)High Risk (RM5x5 S:5 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L3
    - https://w3id.org/dpv/risk#RM7x7S2L3 + https://w3id.org/dpv/risk/owl/#RM5x5S5L3
    + https://w3id.org/dpv/risk#RM5x5S5L3
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18647,7 +20599,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -18710,7 +20662,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - - + @@ -18756,25 +20708,25 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM7x7S2L4RM5x5S5L4 Prefix risk-owl
    LabelLow Risk (RM7x7 S:2 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L4
    - https://w3id.org/dpv/risk#RM7x7S2L4 + https://w3id.org/dpv/risk/owl/#RM5x5S5L4
    + https://w3id.org/dpv/risk#RM5x5S5L4
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18726,7 +20678,7 @@

    Low Risk (RM7x7 S:2 L:4)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -18789,7 +20741,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - - + @@ -18835,25 +20787,25 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM7x7S2L5RM5x5S5L5 Prefix risk-owl
    LabelLow Risk (RM7x7 S:2 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L5
    - https://w3id.org/dpv/risk#RM7x7S2L5 + https://w3id.org/dpv/risk/owl/#RM5x5S5L5
    + https://w3id.org/dpv/risk#RM5x5S5L5
    Sub-class of risk-owl:RiskMatrix7x7 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -18805,7 +20757,7 @@

    Low Risk (RM7x7 S:2 L:5)

    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -18884,7 +20836,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -18914,25 +20866,25 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM7x7S2L6RM7x7S1L1 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:2 L:6)Extremely Low Risk (RM7x7 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L6
    - https://w3id.org/dpv/risk#RM7x7S2L6 + https://w3id.org/dpv/risk/owl/#RM7x7S1L1
    + https://w3id.org/dpv/risk#RM7x7S1L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -18963,7 +20915,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -18993,25 +20945,25 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM7x7S2L7RM7x7S1L2 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely Low Risk (RM7x7 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L7
    - https://w3id.org/dpv/risk#RM7x7S2L7 + https://w3id.org/dpv/risk/owl/#RM7x7S1L2
    + https://w3id.org/dpv/risk#RM7x7S1L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + @@ -19042,7 +20994,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -19072,25 +21024,25 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM7x7S3L1RM7x7S1L3 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Extremely Low Risk (RM7x7 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L1
    - https://w3id.org/dpv/risk#RM7x7S3L1 + https://w3id.org/dpv/risk/owl/#RM7x7S1L3
    + https://w3id.org/dpv/risk#RM7x7S1L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + @@ -19121,7 +21073,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -19151,25 +21103,25 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM7x7S3L2RM7x7S1L4 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:3 L:2)Very Low Risk (RM7x7 S:1 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L2
    - https://w3id.org/dpv/risk#RM7x7S3L2 + https://w3id.org/dpv/risk/owl/#RM7x7S1L4
    + https://w3id.org/dpv/risk#RM7x7S1L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + @@ -19200,7 +21152,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -19230,25 +21182,25 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM7x7S3L3RM7x7S1L5 Prefix risk-owl
    LabelLow Risk (RM7x7 S:3 L:3)Very Low Risk (RM7x7 S:1 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L3
    - https://w3id.org/dpv/risk#RM7x7S3L3 + https://w3id.org/dpv/risk/owl/#RM7x7S1L5
    + https://w3id.org/dpv/risk#RM7x7S1L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + @@ -19279,7 +21231,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -19309,25 +21261,25 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S3L4RM7x7S1L6 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:3 L:4)Very Low Risk (RM7x7 S:1 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L4
    - https://w3id.org/dpv/risk#RM7x7S3L4 + https://w3id.org/dpv/risk/owl/#RM7x7S1L6
    + https://w3id.org/dpv/risk#RM7x7S1L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + @@ -19358,7 +21310,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -19388,25 +21340,25 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM7x7S3L5RM7x7S1L7 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:3 L:5)Low Risk (RM7x7 S:1 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L5
    - https://w3id.org/dpv/risk#RM7x7S3L5 + https://w3id.org/dpv/risk/owl/#RM7x7S1L7
    + https://w3id.org/dpv/risk#RM7x7S1L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + @@ -19437,7 +21389,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -19467,25 +21419,25 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM7x7S3L6RM7x7S2L1 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:3 L:6)Extremely Low Risk (RM7x7 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L6
    - https://w3id.org/dpv/risk#RM7x7S3L6 + https://w3id.org/dpv/risk/owl/#RM7x7S2L1
    + https://w3id.org/dpv/risk#RM7x7S2L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -19516,7 +21468,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -19546,25 +21498,25 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM7x7S3L7RM7x7S2L2 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:3 L:7)Extremely Low Risk (RM7x7 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L7
    - https://w3id.org/dpv/risk#RM7x7S3L7 + https://w3id.org/dpv/risk/owl/#RM7x7S2L2
    + https://w3id.org/dpv/risk#RM7x7S2L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + @@ -19595,7 +21547,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -19625,25 +21577,25 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM7x7S4L1RM7x7S2L3 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Very Low Risk (RM7x7 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L1
    - https://w3id.org/dpv/risk#RM7x7S4L1 + https://w3id.org/dpv/risk/owl/#RM7x7S2L3
    + https://w3id.org/dpv/risk#RM7x7S2L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + @@ -19674,7 +21626,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -19704,25 +21656,25 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S4L2RM7x7S2L4 Prefix risk-owl
    LabelLow Risk (RM7x7 S:4 L:2)Low Risk (RM7x7 S:2 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L2
    - https://w3id.org/dpv/risk#RM7x7S4L2 + https://w3id.org/dpv/risk/owl/#RM7x7S2L4
    + https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + @@ -19753,7 +21705,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -19783,25 +21735,25 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S4L3RM7x7S2L5 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:4 L:3)Low Risk (RM7x7 S:2 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L3
    - https://w3id.org/dpv/risk#RM7x7S4L3 + https://w3id.org/dpv/risk/owl/#RM7x7S2L5
    + https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + @@ -19832,7 +21784,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -19862,25 +21814,25 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S4L4RM7x7S2L6 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:4 L:4)Moderate Risk (RM7x7 S:2 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L4
    - https://w3id.org/dpv/risk#RM7x7S4L4 + https://w3id.org/dpv/risk/owl/#RM7x7S2L6
    + https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + @@ -19911,7 +21863,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -19941,25 +21893,25 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S4L5RM7x7S2L7 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:4 L:5)Moderate Risk (RM7x7 S:2 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L5
    - https://w3id.org/dpv/risk#RM7x7S4L5 + https://w3id.org/dpv/risk/owl/#RM7x7S2L7
    + https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + @@ -19990,7 +21942,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -20020,25 +21972,25 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S4L6RM7x7S3L1 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely Low Risk (RM7x7 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L6
    - https://w3id.org/dpv/risk#RM7x7S4L6 + https://w3id.org/dpv/risk/owl/#RM7x7S3L1
    + https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -20069,7 +22021,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -20099,25 +22051,25 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S4L7RM7x7S3L2 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:4 L:7)Very Low Risk (RM7x7 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L7
    - https://w3id.org/dpv/risk#RM7x7S4L7 + https://w3id.org/dpv/risk/owl/#RM7x7S3L2
    + https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -20148,7 +22100,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -20178,25 +22130,25 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S5L1RM7x7S3L3 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:5 L:1)Low Risk (RM7x7 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L1
    - https://w3id.org/dpv/risk#RM7x7S5L1 + https://w3id.org/dpv/risk/owl/#RM7x7S3L3
    + https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + @@ -20227,7 +22179,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -20257,25 +22209,25 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S5L2RM7x7S3L4 Prefix risk-owl
    LabelLow Risk (RM7x7 S:5 L:2)Moderate Risk (RM7x7 S:3 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L2
    - https://w3id.org/dpv/risk#RM7x7S5L2 + https://w3id.org/dpv/risk/owl/#RM7x7S3L4
    + https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -20306,7 +22258,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -20336,25 +22288,25 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S5L3RM7x7S3L5 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:5 L:3)High Risk (RM7x7 S:3 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L3
    - https://w3id.org/dpv/risk#RM7x7S5L3 + https://w3id.org/dpv/risk/owl/#RM7x7S3L5
    + https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + @@ -20385,7 +22337,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -20415,26 +22367,26 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S5L4RM7x7S3L6 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:5 L:4)High Risk (RM7x7 S:3 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L4
    - https://w3id.org/dpv/risk#RM7x7S5L4 + https://w3id.org/dpv/risk/owl/#RM7x7S3L6
    + https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + + https://w3id.org/dpv/risk/owl/#RM7x7S3L7
    + https://w3id.org/dpv/risk#RM7x7S3L7 + @@ -20464,7 +22416,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -20494,25 +22446,25 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S5L5RM7x7S3L7 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:5 L:5)Very High Risk (RM7x7 S:3 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L5
    - https://w3id.org/dpv/risk#RM7x7S5L5 -
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + @@ -20543,7 +22495,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -20573,25 +22525,25 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S5L6RM7x7S4L1 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:5 L:6)Extremely Low Risk (RM7x7 S:4 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L6
    - https://w3id.org/dpv/risk#RM7x7S5L6 + https://w3id.org/dpv/risk/owl/#RM7x7S4L1
    + https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -20622,7 +22574,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -20652,25 +22604,25 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S5L7RM7x7S4L2 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:5 L:7)Low Risk (RM7x7 S:4 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L7
    - https://w3id.org/dpv/risk#RM7x7S5L7 + https://w3id.org/dpv/risk/owl/#RM7x7S4L2
    + https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -20701,7 +22653,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -20731,25 +22683,25 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S6L1RM7x7S4L3 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:6 L:1)Moderate Risk (RM7x7 S:4 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L1
    - https://w3id.org/dpv/risk#RM7x7S6L1 + https://w3id.org/dpv/risk/owl/#RM7x7S4L3
    + https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -20780,7 +22732,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -20810,25 +22762,25 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S6L2RM7x7S4L4 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:6 L:2)High Risk (RM7x7 S:4 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L2
    - https://w3id.org/dpv/risk#RM7x7S6L2 + https://w3id.org/dpv/risk/owl/#RM7x7S4L4
    + https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -20859,7 +22811,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -20889,25 +22841,25 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S6L3RM7x7S4L5 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:6 L:3)High Risk (RM7x7 S:4 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L3
    - https://w3id.org/dpv/risk#RM7x7S6L3 + https://w3id.org/dpv/risk/owl/#RM7x7S4L5
    + https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + @@ -20938,7 +22890,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -20968,25 +22920,25 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S6L4RM7x7S4L6 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:6 L:4)Very High Risk (RM7x7 S:4 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L4
    - https://w3id.org/dpv/risk#RM7x7S6L4 + https://w3id.org/dpv/risk/owl/#RM7x7S4L6
    + https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -21017,7 +22969,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -21047,25 +22999,25 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S6L5RM7x7S4L7 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:6 L:5)Very High Risk (RM7x7 S:4 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L5
    - https://w3id.org/dpv/risk#RM7x7S6L5 + https://w3id.org/dpv/risk/owl/#RM7x7S4L7
    + https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + @@ -21096,7 +23048,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + @@ -21126,25 +23078,25 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S6L6RM7x7S5L1 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:6 L:6)Very Low Risk (RM7x7 S:5 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L6
    - https://w3id.org/dpv/risk#RM7x7S6L6 + https://w3id.org/dpv/risk/owl/#RM7x7S5L1
    + https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + @@ -21175,7 +23127,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -21205,25 +23157,25 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S6L7RM7x7S5L2 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:6 L:7)Low Risk (RM7x7 S:5 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L7
    - https://w3id.org/dpv/risk#RM7x7S6L7 + https://w3id.org/dpv/risk/owl/#RM7x7S5L2
    + https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -21254,7 +23206,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - + @@ -21284,25 +23236,25 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S7L1RM7x7S5L3 Prefix risk-owl
    LabelLow Risk (RM7x7 S:7 L:1)Moderate Risk (RM7x7 S:5 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L1
    - https://w3id.org/dpv/risk#RM7x7S7L1 + https://w3id.org/dpv/risk/owl/#RM7x7S5L3
    + https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -21333,7 +23285,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -21363,25 +23315,25 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S7L2RM7x7S5L4 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:7 L:2)High Risk (RM7x7 S:5 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L2
    - https://w3id.org/dpv/risk#RM7x7S7L2 + https://w3id.org/dpv/risk/owl/#RM7x7S5L4
    + https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -21412,7 +23364,7 @@

    High Risk (RM7x7 S:7 L:3)

    - + @@ -21442,25 +23394,25 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S7L3RM7x7S5L5 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:7 L:3)Very High Risk (RM7x7 S:5 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L3
    - https://w3id.org/dpv/risk#RM7x7S7L3 + https://w3id.org/dpv/risk/owl/#RM7x7S5L5
    + https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -21491,7 +23443,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + @@ -21521,25 +23473,25 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S7L4RM7x7S5L6 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:7 L:4)Extremely High Risk (RM7x7 S:5 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L4
    - https://w3id.org/dpv/risk#RM7x7S7L4 + https://w3id.org/dpv/risk/owl/#RM7x7S5L6
    + https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + @@ -21570,7 +23522,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -21600,25 +23552,25 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S7L5RM7x7S5L7 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:5)Extremely High Risk (RM7x7 S:5 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L5
    - https://w3id.org/dpv/risk#RM7x7S7L5 + https://w3id.org/dpv/risk/owl/#RM7x7S5L7
    + https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + @@ -21649,7 +23601,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -21679,25 +23631,25 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S7L6RM7x7S6L1 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:6)Very Low Risk (RM7x7 S:6 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L6
    - https://w3id.org/dpv/risk#RM7x7S7L6 + https://w3id.org/dpv/risk/owl/#RM7x7S6L1
    + https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + @@ -21728,7 +23680,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -21758,25 +23710,25 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S7L7RM7x7S6L2 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:7)Moderate Risk (RM7x7 S:6 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L7
    - https://w3id.org/dpv/risk#RM7x7S7L7 + https://w3id.org/dpv/risk/owl/#RM7x7S6L2
    + https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + @@ -21785,15 +23737,16 @@

    Rule-Based System Design

    - @@ -21806,35 +23759,29 @@

    Rule-Based System Design

    - + - - - - + - - - - + - + - + - +
    TermRuleBasedSystemDesignRM7x7S6L3 Prefix risk-owl
    LabelRule-Based System DesignHigh Risk (RM7x7 S:6 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RuleBasedSystemDesign
    - https://w3id.org/dpv/risk#RuleBasedSystemDesign + https://w3id.org/dpv/risk/owl/#RM7x7S6L3
    + https://w3id.org/dpv/risk#RM7x7S6L3
    Type rdfs:Class , owl:Class - , risk-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2024-09-132022-08-17
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-matrix
    @@ -21842,25 +23789,25 @@

    Rule-Based System Design

    -
    -

    Sabotage

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    - + - + @@ -21869,20 +23816,16 @@

    Sabotage

    - - - - - @@ -21895,17 +23838,14 @@

    Sabotage

    - + - - - - + @@ -21913,17 +23853,14 @@

    Sabotage

    - - - - + - +
    TermSabotageRM7x7S6L4 Prefix risk-owl
    LabelSabotageVery High Risk (RM7x7 S:6 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Sabotage
    - https://w3id.org/dpv/risk#Sabotage + https://w3id.org/dpv/risk/owl/#RM7x7S6L4
    + https://w3id.org/dpv/risk#RM7x7S6L4
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionSomething that acts as or causes SabotageNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -21931,25 +23868,25 @@

    Sabotage

    -
    -

    Sampling Bias

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    - + - + @@ -21958,17 +23895,16 @@

    Sampling Bias

    - @@ -21981,32 +23917,29 @@

    Sampling Bias

    - + - - - - + - + - + - +
    TermSamplingBiasRM7x7S6L5 Prefix risk-owl
    LabelSampling BiasVery High Risk (RM7x7 S:6 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SamplingBias
    - https://w3id.org/dpv/risk#SamplingBias + https://w3id.org/dpv/risk/owl/#RM7x7S6L5
    + https://w3id.org/dpv/risk#RM7x7S6L5
    Type rdfs:Class , owl:Class - , risk-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:SelectionBias - → risk-owl:StatisticalBias - → risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionBias that occurs when data records are not collected randomly from the intended populationNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    Source
    Date Created2024-09-132022-08-17
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-matrix
    @@ -22014,25 +23947,25 @@

    Sampling Bias

    -
    -

    Scam

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + @@ -22041,17 +23974,16 @@

    Scam

    - - - @@ -22064,17 +23996,14 @@

    Scam

    - + - - - - + @@ -22082,17 +24011,14 @@

    Scam

    - - - - + - +
    TermScamRM7x7S6L6 Prefix risk-owl
    LabelScamExtremely High Risk (RM7x7 S:6 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Scam
    - https://w3id.org/dpv/risk#Scam + https://w3id.org/dpv/risk/owl/#RM7x7S6L6
    + https://w3id.org/dpv/risk#RM7x7S6L6
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionSomething that acts as or causes ScamNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -22100,25 +24026,25 @@

    Scam

    -
    -

    Security Attack

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    - + - + @@ -22127,23 +24053,16 @@

    Security Attack

    - - - - - - - @@ -22156,7 +24075,7 @@

    Security Attack

    - + @@ -22167,12 +24086,18 @@

    Security Attack

    - - + + + + + + + + - +
    TermSecurityAttackRM7x7S6L7 Prefix risk-owl
    LabelSecurity AttackExtremely High Risk (RM7x7 S:6 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SecurityAttack
    - https://w3id.org/dpv/risk#SecurityAttack + https://w3id.org/dpv/risk/owl/#RM7x7S6L7
    + https://w3id.org/dpv/risk#RM7x7S6L7
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -22180,25 +24105,25 @@

    Security Attack

    -
    -

    Security Breach

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    - + - + @@ -22207,23 +24132,16 @@

    Security Breach

    - - - - - - - @@ -22236,17 +24154,14 @@

    Security Breach

    - + - - - - + @@ -22254,17 +24169,14 @@

    Security Breach

    - - - - + - +
    TermSecurityBreachRM7x7S7L1 Prefix risk-owl
    LabelSecurity BreachLow Risk (RM7x7 S:7 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SecurityBreach
    - https://w3id.org/dpv/risk#SecurityBreach + https://w3id.org/dpv/risk/owl/#RM7x7S7L1
    + https://w3id.org/dpv/risk#RM7x7S7L1
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:IntegrityConcept -
    Sub-class of risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionSomething that acts as or causes Security BreachNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -22272,25 +24184,25 @@

    Security Breach

    -
    -

    Selection Bias

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    - + - + @@ -22299,16 +24211,16 @@

    Selection Bias

    - @@ -22321,32 +24233,29 @@

    Selection Bias

    - + - - - - + - + - + - +
    TermSelectionBiasRM7x7S7L2 Prefix risk-owl
    LabelSelection BiasModerate Risk (RM7x7 S:7 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SelectionBias
    - https://w3id.org/dpv/risk#SelectionBias + https://w3id.org/dpv/risk/owl/#RM7x7S7L2
    + https://w3id.org/dpv/risk#RM7x7S7L2
    Type rdfs:Class , owl:Class - , risk-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:StatisticalBias - → risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    Source
    Date Created2024-09-132022-08-17
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-matrix
    @@ -22354,30 +24263,25 @@

    Selection Bias

    - - - - - -
    -

    Sexual Violence

    +
    +

    High Risk (RM7x7 S:7 L:3)

    - + - + @@ -22386,13 +24290,16 @@

    Sexual Violence

    - @@ -22405,17 +24312,14 @@

    Sexual Violence

    - + - - - - + @@ -22423,17 +24327,14 @@

    Sexual Violence

    - - - - + - +
    TermSexualViolenceRM7x7S7L3 Prefix risk-owl
    LabelSexual ViolenceHigh Risk (RM7x7 S:7 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SexualViolence
    - https://w3id.org/dpv/risk#SexualViolence + https://w3id.org/dpv/risk/owl/#RM7x7S7L3
    + https://w3id.org/dpv/risk#RM7x7S7L3
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:IndividualRisk + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionSomething that acts as or causes Sexual ViolenceNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -22441,25 +24342,25 @@

    Sexual Violence

    -
    -

    Share Risk

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    - + - + @@ -22468,25 +24369,20 @@

    Share Risk

    - - - - - + @@ -22495,7 +24391,7 @@

    Share Risk

    - + @@ -22508,7 +24404,7 @@

    Share Risk

    - + @@ -22517,7 +24413,7 @@

    Share Risk

    - +
    TermShareRiskRM7x7S7L4 Prefix risk-owl
    LabelShare RiskVery High Risk (RM7x7 S:7 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ShareRisk
    - https://w3id.org/dpv/risk#ShareRisk + https://w3id.org/dpv/risk/owl/#RM7x7S7L4
    + https://w3id.org/dpv/risk#RM7x7S7L4
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    Date Created2024-05-192022-08-17
    Documented inRisk Risk-controlsRisk Risk-matrix
    @@ -22525,25 +24421,25 @@

    Share Risk

    -
    -

    Simpson'S Paradox Bias

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    - + - + @@ -22552,15 +24448,16 @@

    Simpson'S Paradox Bias

    - @@ -22573,32 +24470,29 @@

    Simpson'S Paradox Bias

    - + - - - - + - + - + - +
    TermSimpsonsParadoxBiasRM7x7S7L5 Prefix risk-owl
    LabelSimpson'S Paradox BiasExtremely High Risk (RM7x7 S:7 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SimpsonsParadoxBias
    - https://w3id.org/dpv/risk#SimpsonsParadoxBias + https://w3id.org/dpv/risk/owl/#RM7x7S7L5
    + https://w3id.org/dpv/risk#RM7x7S7L5
    Type rdfs:Class , owl:Class - , risk-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combinedNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    Source
    Date Created2024-09-132022-08-17
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-matrix
    @@ -22606,25 +24500,25 @@

    Simpson'S Paradox Bias

    -
    -

    Social Disadvantage

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    - + - + @@ -22633,14 +24527,16 @@

    Social Disadvantage

    - @@ -22653,7 +24549,7 @@

    Social Disadvantage

    - + @@ -22666,19 +24562,16 @@

    Social Disadvantage

    - + - - - - + - + - +
    TermSocialDisadvantageRM7x7S7L6 Prefix risk-owl
    LabelSocial DisadvantageExtremely High Risk (RM7x7 S:7 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SocialDisadvantage
    - https://w3id.org/dpv/risk#SocialDisadvantage + https://w3id.org/dpv/risk/owl/#RM7x7S7L6
    + https://w3id.org/dpv/risk#RM7x7S7L6
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionSomething that acts as or causes Social DisadvantageNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-matrix
    @@ -22686,25 +24579,25 @@

    Social Disadvantage

    -
    -

    Societal Bias

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - + @@ -22713,15 +24606,16 @@

    Societal Bias

    - @@ -22734,32 +24628,29 @@

    Societal Bias

    - + - - - - + - + - + - +
    TermSocietalBiasRM7x7S7L7 Prefix risk-owl
    LabelSocietal BiasExtremely High Risk (RM7x7 S:7 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SocietalBias
    - https://w3id.org/dpv/risk#SocietalBias + https://w3id.org/dpv/risk/owl/#RM7x7S7L7
    + https://w3id.org/dpv/risk#RM7x7S7L7
    Type rdfs:Class , owl:Class - , risk-owl:RiskConcept + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:RiskMatrix7x7 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in societyNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    Source
    Date Created2024-09-132022-08-17
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    Documented inRisk BiasRisk Risk-matrix
    @@ -22767,25 +24658,28 @@

    Societal Bias

    -
    -

    Societal Health & Safety

    + + + +
    +

    Rule-Based System Design

    - + - + @@ -22794,14 +24688,18 @@

    Societal Health & Safety

    - @@ -22812,22 +24710,37 @@

    Societal Health & Safety

    - - + + + + + + + + - + + + + - - + + + + + + + + - +
    TermSocietalHealthSafetyRuleBasedSystemDesign Prefix risk-owl
    LabelSocietal Health & SafetyRule-Based System Design
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SocietalHealthSafety
    - https://w3id.org/dpv/risk#SocietalHealthSafety + https://w3id.org/dpv/risk/owl/#RuleBasedSystemDesign
    + https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -22835,25 +24748,30 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + + + + + +
    +

    Sabotage

    - + - + @@ -22863,12 +24781,19 @@

    Societal Risk

    - @@ -22881,23 +24806,35 @@

    Societal Risk

    - + - + + + + - - - + + + + + + + + + + + + - +
    TermSocietalRiskSabotage Prefix risk-owl
    LabelSocietal RiskSabotage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SocietalRisk
    - https://w3id.org/dpv/risk#SocietalRisk + https://w3id.org/dpv/risk/owl/#Sabotage
    + https://w3id.org/dpv/risk#Sabotage
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of dpv-owl:RiskConcept + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societySomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -22905,25 +24842,28 @@

    Societal Risk

    -
    -

    Source Control

    + + + +
    +

    Sampling Bias

    - + - + @@ -22932,25 +24872,24 @@

    Source Control

    - - - - - + @@ -22959,29 +24898,32 @@

    Source Control

    - + - + + + + - + - + - +
    TermSourceControlSamplingBias Prefix risk-owl
    LabelSource ControlSampling Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SourceControl
    - https://w3id.org/dpv/risk#SourceControl + https://w3id.org/dpv/risk/owl/#SamplingBias
    + https://w3id.org/dpv/risk#SamplingBias
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:SelectionBias + → risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -22989,25 +24931,29 @@

    Source Control

    -
    -

    Spoofing

    + + + + +
    +

    Scam

    - + - + @@ -23017,22 +24963,17 @@

    Spoofing

    - - - - - - - @@ -23046,7 +24987,7 @@

    Spoofing

    - + @@ -23055,7 +24996,7 @@

    Spoofing

    - + @@ -23074,7 +25015,7 @@

    Spoofing

    - +
    TermSpoofingScam Prefix risk-owl
    LabelSpoofingScam
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Spoofing
    - https://w3id.org/dpv/risk#Spoofing + https://w3id.org/dpv/risk/owl/#Scam
    + https://w3id.org/dpv/risk#Scam
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept -
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes SpoofingSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018,ISO/IEC 27005:2018ISO/IEC 27005:2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -23082,25 +25023,30 @@

    Spoofing

    -
    -

    Statistical Bias

    + + + + + +
    +

    Security Attack

    - + - + @@ -23109,15 +25055,19 @@

    Statistical Bias

    - @@ -23130,32 +25080,23 @@

    Statistical Bias

    - + - - - - + - - - - + + - - - - - +
    TermStatisticalBiasSecurityAttack Prefix risk-owl
    LabelStatistical BiasSecurity Attack
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#StatisticalBias
    - https://w3id.org/dpv/risk#StatisticalBias + https://w3id.org/dpv/risk/owl/#SecurityAttack
    + https://w3id.org/dpv/risk#SecurityAttack
    Type rdfs:Class , owl:Class - , risk-owl:RiskConcept + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimatesSomething that acts as or causes an attack on security with the aim of undermining it
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    Documented inRisk BiasRisk Risk-taxonomy
    @@ -23163,25 +25104,31 @@

    Statistical Bias

    -
    -

    System Failure

    + + + + + + +
    +

    Security Breach

    - + - + @@ -23191,14 +25138,17 @@

    System Failure

    - - @@ -23213,19 +25163,16 @@

    System Failure

    - + - - - - + - + @@ -23244,7 +25191,7 @@

    System Failure

    - +
    TermSystemFailureSecurityBreach Prefix risk-owl
    LabelSystem FailureSecurity Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SystemFailure
    - https://w3id.org/dpv/risk#SystemFailure + https://w3id.org/dpv/risk/owl/#SecurityBreach
    + https://w3id.org/dpv/risk#SecurityBreach
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes System FailureSomething that acts as or causes Security Breach
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Threat Landscape for Ransomware Attacks 2022ISO/IEC 27005:2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -23252,25 +25199,28 @@

    System Failure

    -
    -

    System Intrusion

    + + + +
    +

    Selection Bias

    - + - + @@ -23279,23 +25229,19 @@

    System Intrusion

    - - - - - - - @@ -23308,7 +25254,7 @@

    System Intrusion

    - + @@ -23317,26 +25263,23 @@

    System Intrusion

    - + - + - - - - + - + - +
    TermSystemIntrusionSelectionBias Prefix risk-owl
    LabelSystem IntrusionSelection Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SystemIntrusion
    - https://w3id.org/dpv/risk#SystemIntrusion + https://w3id.org/dpv/risk/owl/#SelectionBias
    + https://w3id.org/dpv/risk#SelectionBias
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept + risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
    DefinitionSomething that acts as or causes System IntrusionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -23344,25 +25287,33 @@

    System Intrusion

    -
    -

    System Malfunction

    + + + + + + + + +
    +

    Sex Discrimination

    - + - + @@ -23371,16 +25322,23 @@

    System Malfunction

    - - @@ -23394,38 +25352,26 @@

    System Malfunction

    - + - - - - + - - - - + - + - - - - - - - - + + - +
    TermSystemMalfunctionSexDiscrimination Prefix risk-owl
    LabelSystem MalfunctionSex Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SystemMalfunction
    - https://w3id.org/dpv/risk#SystemMalfunction + https://w3id.org/dpv/risk/owl/#SexDiscrimination
    + https://w3id.org/dpv/risk#SexDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:AvailabilityConcept + risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:RiskConcept
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionDiscrimination based on a person's biological sex
    Usage NoteHere system refers to both hardware and software systems
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -23433,25 +25379,28 @@

    System Malfunction

    -
    -

    Terrorism

    + + + +
    +

    Sexism

    - + - + @@ -23460,13 +25409,21 @@

    Terrorism

    - + + @@ -23480,60 +25437,55 @@

    Terrorism

    - + - - - - + - + - - - - - - - - + + - +
    TermTerrorismSexism Prefix risk-owl
    LabelTerrorismSexism
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Terrorism
    - https://w3id.org/dpv/risk#Terrorism + https://w3id.org/dpv/risk/owl/#Sexism
    + https://w3id.org/dpv/risk#Sexism
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:SocietalRisk + risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes TerrorismDiscrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    -
    -

    Threat

    + + + + +
    +

    Sexual Harassment

    - + - + @@ -23542,38 +25494,28 @@

    Threat

    - - - - - - - - - + + - - - - + @@ -23583,40 +25525,41 @@

    Threat

    - - - - + - +
    TermThreatSexualHarassment Prefix risk-owl
    LabelThreatSexual Harassment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Threat
    - https://w3id.org/dpv/risk#Threat + https://w3id.org/dpv/risk/owl/#SexualHarassment
    + https://w3id.org/dpv/risk#SexualHarassment
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskSource - → dpv-owl:RiskConcept + risk-owl:Harm + → risk-owl:IndividualRisk
    in Domain of risk-owl:exploitsVulnerability, - risk-owl:hasThreatSource -
    in Range of risk-owl:causedByThreat, - risk-owl:hasRiskSource, - risk-owl:isExploitedBy -
    DefinitionRisk source event which causes Risk
    Date Created2024-02-14
    Documented inRisk CoreRisk Risk-taxonomy
    -
    -

    Threat Source

    + + + + +
    +

    SexualOrientation Discrimination

    - + - + @@ -23625,17 +25568,26 @@

    Threat Source

    - + + + + + - - - - + @@ -23644,7 +25596,7 @@

    Threat Source

    - + @@ -23657,13 +25609,13 @@

    Threat Source

    - + - +
    TermThreatSourceSexualOrientationDiscrimination Prefix risk-owl
    LabelThreat SourceSexualOrientation Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ThreatSource
    - https://w3id.org/dpv/risk#ThreatSource + https://w3id.org/dpv/risk/owl/#SexualOrientationDiscrimination
    + https://w3id.org/dpv/risk#SexualOrientationDiscrimination
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept +
    in Range of risk-owl:hasThreatSource -
    DefinitionSource of threat event, including both agent and non-agent sourcesDiscrimination based on a person's sexual orientation, typically against those who are not heterosexual
    Date Created2024-02-142024-09-30
    Documented inRisk CoreRisk Risk-taxonomy
    @@ -23671,25 +25623,28 @@

    Threat Source

    -
    -

    Unauthorised Access to Premises

    + + + +
    +

    Sexual Violence

    - + - + @@ -23699,22 +25654,16 @@

    Unauthorised Access to Premises

    - - - - - - - @@ -23727,7 +25676,7 @@

    Unauthorised Access to Premises

    - + @@ -23736,7 +25685,7 @@

    Unauthorised Access to Premises

    - + @@ -23755,7 +25704,7 @@

    Unauthorised Access to Premises

    - +
    TermUnauthorisedAccesstoPremisesSexualViolence Prefix risk-owl
    LabelUnauthorised Access to PremisesSexual Violence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedAccesstoPremises
    - https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises + https://w3id.org/dpv/risk/owl/#SexualViolence
    + https://w3id.org/dpv/risk#SexualViolence
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept + risk-owl:Harm + → risk-owl:IndividualRisk
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesSomething that acts as or causes Sexual Violence
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -23763,25 +25712,25 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Activity

    +
    +

    Share Risk

    - + - + @@ -23790,27 +25739,25 @@

    Unauthorised Activity

    - - - - - - - - + + + + @@ -23819,7 +25766,7 @@

    Unauthorised Activity

    - + @@ -23830,12 +25777,18 @@

    Unauthorised Activity

    - - + + + + + + + + - +
    TermUnauthorisedActivityShareRisk Prefix risk-owl
    LabelUnauthorised ActivityShare Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedActivity
    - https://w3id.org/dpv/risk#UnauthorisedActivity + https://w3id.org/dpv/risk/owl/#ShareRisk
    + https://w3id.org/dpv/risk#ShareRisk
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or causes Unauthorised ActivityRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -23843,25 +25796,28 @@

    Unauthorised Activity

    -
    -

    Unauthorised Code Access

    + + + +
    +

    Simpson'S Paradox Bias

    - + - + @@ -23870,20 +25826,18 @@

    Unauthorised Code Access

    - - - - - @@ -23896,7 +25850,7 @@

    Unauthorised Code Access

    - + @@ -23905,26 +25859,23 @@

    Unauthorised Code Access

    - + - + - - - - + - + - +
    TermUnauthorisedCodeAccessSimpsonsParadoxBias Prefix risk-owl
    LabelUnauthorised Code AccessSimpson'S Paradox Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedCodeAccess
    - https://w3id.org/dpv/risk#UnauthorisedCodeAccess + https://w3id.org/dpv/risk/owl/#SimpsonsParadoxBias
    + https://w3id.org/dpv/risk#SimpsonsParadoxBias
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept + risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code AccessBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -23932,25 +25883,28 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    + + + +
    +

    Social Disadvantage

    - + - + @@ -23960,15 +25914,15 @@

    Unauthorised Code Disclosure

    - - - @@ -23982,23 +25936,20 @@

    Unauthorised Code Disclosure

    - + - - - - + - + @@ -24006,11 +25957,11 @@

    Unauthorised Code Disclosure

    - + - +
    TermUnauthorisedCodeDisclosureSocialDisadvantage Prefix risk-owl
    LabelUnauthorised Code DisclosureSocial Disadvantage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedCodeDisclosure
    - https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure + https://w3id.org/dpv/risk/owl/#SocialDisadvantage
    + https://w3id.org/dpv/risk#SocialDisadvantage
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureSomething that acts as or causes Social Disadvantage
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-19
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24018,25 +25969,28 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    + + + +
    +

    Societal Bias

    - + - + @@ -24045,17 +25999,18 @@

    Unauthorised Code Modification

    - - - @@ -24068,7 +26023,7 @@

    Unauthorised Code Modification

    - + @@ -24077,26 +26032,23 @@

    Unauthorised Code Modification

    - + - + - - - - + - + - +
    TermUnauthorisedCodeModificationSocietalBias Prefix risk-owl
    LabelUnauthorised Code ModificationSocietal Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedCodeModification
    - https://w3id.org/dpv/risk#UnauthorisedCodeModification + https://w3id.org/dpv/risk/owl/#SocietalBias
    + https://w3id.org/dpv/risk#SocietalBias
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code ModificationBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24104,25 +26056,28 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    + + + +
    +

    Societal Health & Safety

    - + - + @@ -24132,15 +26087,15 @@

    Unauthorised Data Access

    - - - @@ -24152,37 +26107,22 @@

    Unauthorised Data Access

    - - - - + - - - - + - - - - - - - - - - - - + + + - +
    TermUnauthorisedDataAccessSocietalHealthSafety Prefix risk-owl
    LabelUnauthorised Data AccessSocietal Health & Safety
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedDataAccess
    - https://w3id.org/dpv/risk#UnauthorisedDataAccess + https://w3id.org/dpv/risk/owl/#SocietalHealthSafety
    + https://w3id.org/dpv/risk#SocietalHealthSafety
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:SocietalRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data Access
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24190,25 +26130,28 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    + + + +
    +

    Societal Risk

    - + - + @@ -24218,16 +26161,15 @@

    Unauthorised Data Disclosure

    - - - @@ -24240,35 +26182,23 @@

    Unauthorised Data Disclosure

    - + - - - - + - - - - - - - - - - - - + + + - +
    TermUnauthorisedDataDisclosureSocietalRisk Prefix risk-owl
    LabelUnauthorised Data DisclosureSocietal Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedDataDisclosure
    - https://w3id.org/dpv/risk#UnauthorisedDataDisclosure + https://w3id.org/dpv/risk/owl/#SocietalRisk
    + https://w3id.org/dpv/risk#SocietalRisk
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureRisks and issues that affect or have the potential to affect society at large or specific groups in society
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24276,25 +26206,25 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Source Control

    - + - + @@ -24303,21 +26233,25 @@

    Unauthorised Data Modification

    - - - - + + + + @@ -24326,35 +26260,29 @@

    Unauthorised Data Modification

    - + - - - - + - + - - - - + - +
    TermUnauthorisedDataModificationSourceControl Prefix risk-owl
    LabelUnauthorised Data ModificationSource Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedDataModification
    - https://w3id.org/dpv/risk#UnauthorisedDataModification + https://w3id.org/dpv/risk/owl/#SourceControl
    + https://w3id.org/dpv/risk#SourceControl
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or causes Unauthorised Data ModificationRisk Mitigation Measure that controls the Source
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-controls
    @@ -24362,25 +26290,30 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Information Disclosure

    + + + + + +
    +

    Spoofing

    - + - + @@ -24390,15 +26323,18 @@

    Unauthorised Information Disclosure

    - - - @@ -24412,7 +26348,7 @@

    Unauthorised Information Disclosure

    - + @@ -24421,7 +26357,7 @@

    Unauthorised Information Disclosure

    - + @@ -24440,7 +26376,7 @@

    Unauthorised Information Disclosure

    - +
    TermUnauthorisedInformationDisclosureSpoofing Prefix risk-owl
    LabelUnauthorised Information DisclosureSpoofing
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedInformationDisclosure
    - https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure + https://w3id.org/dpv/risk/owl/#Spoofing
    + https://w3id.org/dpv/risk#Spoofing
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureSomething that acts as or causes Spoofing
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24448,25 +26384,28 @@

    Unauthorised Information Disclosure

    -
    -

    Unauthorised Re-Identification

    + + + +
    +

    Statistical Bias

    - + - + @@ -24475,17 +26414,18 @@

    Unauthorised Re-Identification

    - - - @@ -24498,32 +26438,32 @@

    Unauthorised Re-Identification

    - + - + + + + - + - - - - + - + - +
    TermUnauthorisedReidentificationStatisticalBias Prefix risk-owl
    LabelUnauthorised Re-IdentificationStatistical Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedReidentification
    - https://w3id.org/dpv/risk#UnauthorisedReidentification + https://w3id.org/dpv/risk/owl/#StatisticalBias
    + https://w3id.org/dpv/risk#StatisticalBias
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
    Source
    Date Created2022-08-192024-09-13
    Date Modified2024-08-16
    ContributorsGeorg P. KrogDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24531,25 +26471,29 @@

    Unauthorised Re-Identification

    -
    -

    Unauthorised Resource Use

    + + + + +
    +

    System Failure

    - + - + @@ -24559,15 +26503,16 @@

    Unauthorised Resource Use

    - - - @@ -24581,16 +26526,19 @@

    Unauthorised Resource Use

    - + - + + + + - + @@ -24609,7 +26557,7 @@

    Unauthorised Resource Use

    - +
    TermUnauthorisedResourceUseSystemFailure Prefix risk-owl
    LabelUnauthorised Resource UseSystem Failure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedResourceUse
    - https://w3id.org/dpv/risk#UnauthorisedResourceUse + https://w3id.org/dpv/risk/owl/#SystemFailure
    + https://w3id.org/dpv/risk#SystemFailure
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Resource UseSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceISO/IEC 27005:2018ENISA Threat Landscape for Ransomware Attacks 2022
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24617,25 +26565,30 @@

    Unauthorised Resource Use

    -
    -

    Unauthorised System Access

    + + + + + +
    +

    System Intrusion

    - + - + @@ -24645,19 +26598,19 @@

    Unauthorised System Access

    - - - - - @@ -24670,7 +26623,7 @@

    Unauthorised System Access

    - + @@ -24679,7 +26632,7 @@

    Unauthorised System Access

    - + @@ -24698,7 +26651,7 @@

    Unauthorised System Access

    - +
    TermUnauthorisedSystemAccessSystemIntrusion Prefix risk-owl
    LabelUnauthorised System AccessSystem Intrusion
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedSystemAccess
    - https://w3id.org/dpv/risk#UnauthorisedSystemAccess + https://w3id.org/dpv/risk/owl/#SystemIntrusion
    + https://w3id.org/dpv/risk#SystemIntrusion
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept
    DefinitionSomething that acts as or causes Unauthorised System AccessSomething that acts as or causes System Intrusion
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24706,25 +26659,29 @@

    Unauthorised System Access

    -
    -

    Unauthorised System Modification

    + + + + +
    +

    System Malfunction

    - + - + @@ -24734,16 +26691,17 @@

    Unauthorised System Modification

    - - - @@ -24756,16 +26714,19 @@

    Unauthorised System Modification

    - + - + + + + - + @@ -24784,7 +26745,7 @@

    Unauthorised System Modification

    - +
    TermUnauthorisedSystemModificationSystemMalfunction Prefix risk-owl
    LabelUnauthorised System ModificationSystem Malfunction
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnauthorisedSystemModification
    - https://w3id.org/dpv/risk#UnauthorisedSystemModification + https://w3id.org/dpv/risk/owl/#SystemMalfunction
    + https://w3id.org/dpv/risk#SystemMalfunction
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept
    DefinitionSomething that acts as or causes Unauthorised System ModificationSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -24792,25 +26753,28 @@

    Unauthorised System Modification

    -
    -

    Unwanted Code Deletion

    + + + +
    +

    Terrorism

    - + - + @@ -24820,19 +26784,16 @@

    Unwanted Code Deletion

    - - - - - @@ -24845,7 +26806,7 @@

    Unwanted Code Deletion

    - + @@ -24854,7 +26815,7 @@

    Unwanted Code Deletion

    - + @@ -24873,33 +26834,32 @@

    Unwanted Code Deletion

    - +
    TermUnwantedCodeDeletionTerrorism Prefix risk-owl
    LabelUnwanted Code DeletionTerrorism
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnwantedCodeDeletion
    - https://w3id.org/dpv/risk#UnwantedCodeDeletion + https://w3id.org/dpv/risk/owl/#Terrorism
    + https://w3id.org/dpv/risk#Terrorism
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:SocietalRiskdpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept
    DefinitionSomething that acts as or causes Unwanted Code DeletionSomething that acts as or causes Terrorism
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    - -
    -

    Unwanted Data Deletion

    +
    +

    Threat

    - + - + @@ -24908,24 +26868,28 @@

    Unwanted Data Deletion

    - - - - - - - + + + + + + + + @@ -24934,61 +26898,51 @@

    Unwanted Data Deletion

    - + - - - - + - + - - - - - - - - + + - +
    TermUnwantedDataDeletionThreat Prefix risk-owl
    LabelUnwanted Data DeletionThreat
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnwantedDataDeletion
    - https://w3id.org/dpv/risk#UnwantedDataDeletion + https://w3id.org/dpv/risk/owl/#Threat
    + https://w3id.org/dpv/risk#Threat
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
    Sub-class of risk-owl:AvailabilityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:RiskSourcedpv-owl:RiskConcept -
    Sub-class of risk-owl:IntegrityConcept
    in Domain of risk-owl:exploitsVulnerability, + risk-owl:hasThreatSource +
    in Range of risk-owl:causedByThreat, + risk-owl:hasRiskSource, + risk-owl:isExploitedBy +
    DefinitionSomething that acts as or causes Unwanted Data DeletionRisk source event which causes Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Core
    - -
    -

    Unwanted Disclosure of Data

    +
    +

    Threat Source

    - + - + @@ -24997,21 +26951,17 @@

    Unwanted Disclosure of Data

    - - - - - + - + + + + @@ -25020,35 +26970,26 @@

    Unwanted Disclosure of Data

    - + - - - - + - + - - - - - - - - + + - +
    TermUnwantedDisclosureDataThreatSource Prefix risk-owl
    LabelUnwanted Disclosure of DataThreat Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UnwantedDisclosureData
    - https://w3id.org/dpv/risk#UnwantedDisclosureData + https://w3id.org/dpv/risk/owl/#ThreatSource
    + https://w3id.org/dpv/risk#ThreatSource
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
    Sub-class of risk-owl:ConfidentialityConcept -
    Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
    in Range of risk-owl:hasThreatSource +
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataSource of threat event, including both agent and non-agent sources
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Core
    @@ -25056,25 +26997,28 @@

    Unwanted Disclosure of Data

    -
    -

    User Risks

    + + + +
    +

    Transphobia

    - + - + @@ -25083,13 +27027,24 @@

    User Risks

    - + + @@ -25102,7 +27057,7 @@

    User Risks

    - + @@ -25113,12 +27068,15 @@

    User Risks

    - + + + + - +
    TermUserRisksTransphobia Prefix risk-owl
    LabelUser RisksTransphobia
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#UserRisks
    - https://w3id.org/dpv/risk#UserRisks + https://w3id.org/dpv/risk/owl/#Transphobia
    + https://w3id.org/dpv/risk#Transphobia
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of dpv-owl:RiskConcept + risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:SocietalRisk + → dpv-owl:RiskConcept
    DefinitionConcepts associated with risks that arise due to User or Human useHostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms
    Date Created2024-09-30
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -25126,25 +27084,31 @@

    User Risks

    -
    -

    Very High Likelihood

    + + + + + + +
    +

    Unauthorised Access to Premises

    - + - + @@ -25153,26 +27117,25 @@

    Very High Likelihood

    - - - - - - - + @@ -25181,32 +27144,35 @@

    Very High Likelihood

    - + - - - - + - + + + + - + - + + + + - +
    TermVeryHighLikelihoodUnauthorisedAccesstoPremises Prefix risk-owl
    LabelVery High LikelihoodUnauthorised Access to Premises
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#VeryHighLikelihood
    - https://w3id.org/dpv/risk#VeryHighLikelihood + https://w3id.org/dpv/risk/owl/#UnauthorisedAccesstoPremises
    + https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is Very HighSomething that acts as or causes Unauthorised Access to Premises
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -25214,25 +27180,31 @@

    Very High Likelihood

    -
    -

    Very High Risk

    + + + + + + +
    +

    Unauthorised Activity

    - + - + @@ -25241,26 +27213,24 @@

    Very High Risk

    - - - - - - - + @@ -25269,12 +27239,9 @@

    Very High Risk

    - + - - - - + @@ -25283,18 +27250,12 @@

    Very High Risk

    - - - - + + - - - - - +
    TermVeryHighRiskUnauthorisedActivity Prefix risk-owl
    LabelVery High RiskUnauthorised Activity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#VeryHighRisk
    - https://w3id.org/dpv/risk#VeryHighRisk + https://w3id.org/dpv/risk/owl/#UnauthorisedActivity
    + https://w3id.org/dpv/risk#UnauthorisedActivity
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is Very HighSomething that acts as or causes Unauthorised Activity
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -25302,25 +27263,30 @@

    Very High Risk

    -
    -

    Very High Severity

    + + + + + +
    +

    Unauthorised Code Access

    - + - + @@ -25329,26 +27295,24 @@

    Very High Severity

    - - - - - - - + @@ -25357,32 +27321,35 @@

    Very High Severity

    - + - - - - + - + + + + - + - + + + + - +
    TermVeryHighSeverityUnauthorisedCodeAccess Prefix risk-owl
    LabelVery High SeverityUnauthorised Code Access
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#VeryHighSeverity
    - https://w3id.org/dpv/risk#VeryHighSeverity + https://w3id.org/dpv/risk/owl/#UnauthorisedCodeAccess
    + https://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is Very HighSomething that acts as or causes Unauthorised Code Access
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -25390,25 +27357,29 @@

    Very High Severity

    -
    -

    Very Low Likelihood

    + + + + +
    +

    Unauthorised Code Disclosure

    - + - + @@ -25417,26 +27388,23 @@

    Very Low Likelihood

    - - - - - - - + @@ -25445,32 +27413,35 @@

    Very Low Likelihood

    - + - - - - + - + + + + - + - + + + + - +
    TermVeryLowLikelihoodUnauthorisedCodeDisclosure Prefix risk-owl
    LabelVery Low LikelihoodUnauthorised Code Disclosure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#VeryLowLikelihood
    - https://w3id.org/dpv/risk#VeryLowLikelihood + https://w3id.org/dpv/risk/owl/#UnauthorisedCodeDisclosure
    + https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is Very LowSomething that acts as or causes Unauthorised Code Disclosure
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -25478,25 +27449,29 @@

    Very Low Likelihood

    -
    -

    Very Low Risk

    + + + + +
    +

    Unauthorised Code Modification

    - + - + @@ -25505,26 +27480,23 @@

    Very Low Risk

    - - - - - - - + @@ -25533,32 +27505,35 @@

    Very Low Risk

    - + - - - - + - + + + + - + - + + + + - +
    TermVeryLowRiskUnauthorisedCodeModification Prefix risk-owl
    LabelVery Low RiskUnauthorised Code Modification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#VeryLowRisk
    - https://w3id.org/dpv/risk#VeryLowRisk + https://w3id.org/dpv/risk/owl/#UnauthorisedCodeModification
    + https://w3id.org/dpv/risk#UnauthorisedCodeModification
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is Very LowSomething that acts as or causes Unauthorised Code Modification
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -25566,25 +27541,29 @@

    Very Low Risk

    -
    -

    Very Low Severity

    + + + + +
    +

    Unauthorised Data Access

    - + - + @@ -25593,26 +27572,23 @@

    Very Low Severity

    - - - - - - - + @@ -25621,32 +27597,35 @@

    Very Low Severity

    - + - - - - + - + + + + - + - + + + + - +
    TermVeryLowSeverityUnauthorisedDataAccess Prefix risk-owl
    LabelVery Low SeverityUnauthorised Data Access
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#VeryLowSeverity
    - https://w3id.org/dpv/risk#VeryLowSeverity + https://w3id.org/dpv/risk/owl/#UnauthorisedDataAccess
    + https://w3id.org/dpv/risk#UnauthorisedDataAccess
    Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is Very LowSomething that acts as or causes Unauthorised Data Access
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -25654,25 +27633,29 @@

    Very Low Severity

    -
    -

    Violating Code of Conduct

    + + + + +
    +

    Unauthorised Data Disclosure

    - + - + @@ -25682,12 +27665,17 @@

    Violating Code of Conduct

    - @@ -25701,12 +27689,9 @@

    Violating Code of Conduct

    - + - - - - + @@ -25732,7 +27717,7 @@

    Violating Code of Conduct

    - +
    TermViolatingCodeOfConductUnauthorisedDataDisclosure Prefix risk-owl
    LabelViolating Code of ConductUnauthorised Data Disclosure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolatingCodeOfConduct
    - https://w3id.org/dpv/risk#ViolatingCodeOfConduct + https://w3id.org/dpv/risk/owl/#UnauthorisedDataDisclosure
    + https://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:LegalRisk + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Code of ConductSomething that acts as or causes Unauthorised Data Disclosure
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -25740,25 +27725,29 @@

    Violating Code of Conduct

    -
    -

    Violation of Contractual Obligation

    + + + + +
    +

    Unauthorised Data Modification

    - + - + @@ -25768,12 +27757,17 @@

    Violation of Contractual Obligation

    - @@ -25787,19 +27781,16 @@

    Violation of Contractual Obligation

    - + - - - - + - + @@ -25818,7 +27809,7 @@

    Violation of Contractual Obligation

    - +
    TermViolatingContractualObligationUnauthorisedDataModification Prefix risk-owl
    LabelViolation of Contractual ObligationUnauthorised Data Modification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolatingContractualObligation
    - https://w3id.org/dpv/risk#ViolatingContractualObligation + https://w3id.org/dpv/risk/owl/#UnauthorisedDataModification
    + https://w3id.org/dpv/risk#UnauthorisedDataModification
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:LegalRisk + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsSomething that acts as or causes Unauthorised Data Modification
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -25826,25 +27817,29 @@

    Violation of Contractual Obligation

    -
    -

    Violating Ethics Code

    + + + + +
    +

    Unauthorised Information Disclosure

    - + - + @@ -25854,12 +27849,17 @@

    Violating Ethics Code

    - @@ -25873,19 +27873,16 @@

    Violating Ethics Code

    - + - - - - + - + @@ -25904,7 +27901,7 @@

    Violating Ethics Code

    - +
    TermViolatingEthicsCodeUnauthorisedInformationDisclosure Prefix risk-owl
    LabelViolating Ethics CodeUnauthorised Information Disclosure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolatingEthicsCode
    - https://w3id.org/dpv/risk#ViolatingEthicsCode + https://w3id.org/dpv/risk/owl/#UnauthorisedInformationDisclosure
    + https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:LegalRisk + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Ethics CodeSomething that acts as or causes Unauthorised Information Disclosure
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -25912,25 +27909,29 @@

    Violating Ethics Code

    -
    -

    Violation of Legal Obligations

    + + + + +
    +

    Unauthorised Re-Identification

    - + - + @@ -25940,12 +27941,17 @@

    Violation of Legal Obligations

    - @@ -25959,26 +27965,20 @@

    Violation of Legal Obligations

    - + - - - - + - - - - + - + @@ -25986,11 +27986,11 @@

    Violation of Legal Obligations

    - + - +
    TermViolatingLegalObligationUnauthorisedReidentification Prefix risk-owl
    LabelViolation of Legal ObligationsUnauthorised Re-Identification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolatingLegalObligation
    - https://w3id.org/dpv/risk#ViolatingLegalObligation + https://w3id.org/dpv/risk/owl/#UnauthorisedReidentification
    + https://w3id.org/dpv/risk#UnauthorisedReidentification
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:LegalRisk + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Legal ObligationsSomething that acts as or causes Unauthorised Re-Identification
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-19
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -25998,25 +27998,29 @@

    Violation of Legal Obligations

    -
    -

    Violating Policy

    + + + + +
    +

    Unauthorised Resource Use

    - + - + @@ -26026,12 +28030,17 @@

    Violating Policy

    - @@ -26045,23 +28054,35 @@

    Violating Policy

    - + - + + + + - - - + + + + + + + + + + + + - +
    TermViolatingPolicyUnauthorisedResourceUse Prefix risk-owl
    LabelViolating PolicyUnauthorised Resource Use
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolatingPolicy
    - https://w3id.org/dpv/risk#ViolatingPolicy + https://w3id.org/dpv/risk/owl/#UnauthorisedResourceUse
    + https://w3id.org/dpv/risk#UnauthorisedResourceUse
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:LegalRisk + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policySomething that acts as or causes Unauthorised Resource Use
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -26069,25 +28090,30 @@

    Violating Policy

    -
    -

    Violation of Statutory Obligations

    + + + + + +
    +

    Unauthorised System Access

    - + - + @@ -26097,12 +28123,18 @@

    Violation of Statutory Obligations

    - @@ -26116,12 +28148,9 @@

    Violation of Statutory Obligations

    - + - - - - + @@ -26147,7 +28176,7 @@

    Violation of Statutory Obligations

    - +
    TermViolatingStatutoryObligationsUnauthorisedSystemAccess Prefix risk-owl
    LabelViolation of Statutory ObligationsUnauthorised System Access
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolatingStatutoryObligations
    - https://w3id.org/dpv/risk#ViolatingStatutoryObligations + https://w3id.org/dpv/risk/owl/#UnauthorisedSystemAccess
    + https://w3id.org/dpv/risk#UnauthorisedSystemAccess
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:LegalRisk + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Statutory ObligationsSomething that acts as or causes Unauthorised System Access
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    @@ -26155,25 +28184,29 @@

    Violation of Statutory Obligations

    -
    -

    Violence against children

    + + + + +
    +

    Unauthorised System Modification

    - + - + @@ -26183,12 +28216,18 @@

    Violence against children

    - @@ -26201,19 +28240,16 @@

    Violence against children

    - + - - - - + - + @@ -26232,32 +28268,38 @@

    Violence against children

    - +
    TermViolenceAgainstChildrenUnauthorisedSystemModification Prefix risk-owl
    LabelViolence against childrenUnauthorised System Modification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ViolenceAgainstChildren
    - https://w3id.org/dpv/risk#ViolenceAgainstChildren + https://w3id.org/dpv/risk/owl/#UnauthorisedSystemModification
    + https://w3id.org/dpv/risk#UnauthorisedSystemModification
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:IndividualRisk + risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Child ViolenceSomething that acts as or causes Unauthorised System Modification
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Methodology for Sectoral Cybersecurity Assessments
    Documented inRisk Risk-consequencesRisk Risk-taxonomy
    -
    -

    Vulnerability

    + + + + + + +
    +

    Unwanted Code Deletion

    - + - + @@ -26266,24 +28308,24 @@

    Vulnerability

    + + + - - - - - - - - - + + @@ -26292,151 +28334,39 @@

    Vulnerability

    - + - + + + + - + - - + + + + + + + + - +
    TermVulnerabilityUnwantedCodeDeletion Prefix risk-owl
    LabelVulnerabilityUnwanted Code Deletion
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Vulnerability
    - https://w3id.org/dpv/risk#Vulnerability + https://w3id.org/dpv/risk/owl/#UnwantedCodeDeletion
    + https://w3id.org/dpv/risk#UnwantedCodeDeletion
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
    in Domain of risk-owl:isExploitedBy, - risk-owl:isVulnerabilityOf -
    in Range of risk-owl:causedByVulnerability, - risk-owl:exploitsVulnerability, - risk-owl:hasVulnerability -
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskSomething that acts as or causes Unwanted Code Deletion
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    - -
    -
    -

    Properties

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -26445,8 +28375,92 @@

    Properties

    +
    +

    Unwanted Data Deletion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermUnwantedDataDeletionPrefixrisk-owl
    LabelUnwanted Data Deletion
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#UnwantedDataDeletion
    + https://w3id.org/dpv/risk#UnwantedDataDeletion +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
    DefinitionSomething that acts as or causes Unwanted Data Deletion
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    @@ -26454,124 +28468,145 @@

    Properties

    - -
    -

    caused by threat

    +
    +

    Unwanted Disclosure of Data

    - + - + - + + + - + - - - - + - + - + + + + - + - - + + + + + + + + - +
    TermcausedByThreatUnwantedDisclosureData Prefix risk-owl
    Labelcaused by threatUnwanted Disclosure of Data
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#causedByThreat
    - https://w3id.org/dpv/risk#causedByThreat + https://w3id.org/dpv/risk/owl/#UnwantedDisclosureData
    + https://w3id.org/dpv/risk#UnwantedDisclosureData
    Type rdf:Property + rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:UnauthorisedActivity + → risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
    Range includes risk-owl:Threat -
    DefinitionIndicates the cause of associated context (subject) was the indicated threat (object)Something that acts as or causes Unwanted Disclosure of Data
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    -
    -

    caused by vulnerability

    + + + +
    +

    User Risks

    - + - + - + + + - + - - - - + - + @@ -26582,15 +28617,12 @@

    caused by vulnerability

    - - - - + - +
    TermcausedByVulnerabilityUserRisks Prefix risk-owl
    Labelcaused by vulnerabilityUser Risks
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#causedByVulnerability
    - https://w3id.org/dpv/risk#causedByVulnerability + https://w3id.org/dpv/risk/owl/#UserRisks
    + https://w3id.org/dpv/risk#UserRisks
    Type rdf:Property + rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of dpv-owl:RiskConcept +
    Range includes risk-owl:Vulnerability -
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)Concepts associated with risks that arise due to User or Human use
    Date Created2024-02-14
    Documented inRisk CoreRisk Risk-taxonomy
    @@ -26598,163 +28630,155 @@

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
    +

    Very High Likelihood

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermVeryHighLikelihoodPrefixrisk-owl
    LabelVery High Likelihood
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#VeryHighLikelihood
    + https://w3id.org/dpv/risk#VeryHighLikelihood +
    Type rdfs:Class + , owl:Class + , dpv-owl:Likelihood +
    Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood +
    in Range of dpv-owl:hasLikelihood +
    DefinitionLevel where Likelihood is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    +
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    exploits vulnerability

    +
    +

    Very High Risk

    - + - + - + + + + + - - + + + + + + + - - - - - - - - - + - + + + + @@ -26765,13 +28789,16 @@

    exploits vulnerability

    - + - + + + + - +
    TermexploitsVulnerabilityVeryHighRisk Prefix risk-owl
    Labelexploits vulnerabilityVery High Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#exploitsVulnerability
    - https://w3id.org/dpv/risk#exploitsVulnerability + https://w3id.org/dpv/risk/owl/#VeryHighRisk
    + https://w3id.org/dpv/risk#VeryHighRisk
    Type rdf:Property + rdfs:Class , owl:Class + , dpv-owl:RiskLevel
    Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel +
    in Range of dpv-owl:hasRiskLevel +
    Domain includes risk-owl:Threat -
    Range includes risk-owl:Vulnerability -
    DefinitionIndicates the threat (subject) exploits the indicated vulnerability (object)Level where Risk is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-levels
    @@ -26779,106 +28806,68 @@

    exploits vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    has control

    +
    +

    Very High Severity

    - + - + - + + + + + - - + + + + + + - - - - - + + + + + - - - - @@ -26888,67 +28877,84 @@

    has control

    - + - + + + + - +
    TermhasControlVeryHighSeverity Prefix risk-owl
    Labelhas controlVery High Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#hasControl
    - https://w3id.org/dpv/risk#hasControl + https://w3id.org/dpv/risk/owl/#VeryHighSeverity
    + https://w3id.org/dpv/risk#VeryHighSeverity
    Type rdf:Property + rdfs:Class , owl:Class + , dpv-owl:Severity
    Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity +
    in Range of dpv-owl:hasSeverity +
    Range includes risk-owl:RiskControl -
    DefinitionIndicates the use of specified controlLevel where Severity is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Examples Using risk controls to express how tech/org measures address the risk (E0071) -
    Date Created2024-02-142022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inDex CoreRisk Risk-levels
    -
    -

    has incident

    + +
    +

    Very Low Likelihood

    - + - + - + + + + + - - + + + + + + - - - - - + - + + + + @@ -26959,71 +28965,84 @@

    has incident

    - + - + + + + - +
    TermhasIncidentVeryLowLikelihood Prefix risk-owl
    Labelhas incidentVery Low Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#hasIncident
    - https://w3id.org/dpv/risk#hasIncident + https://w3id.org/dpv/risk/owl/#VeryLowLikelihood
    + https://w3id.org/dpv/risk#VeryLowLikelihood
    Type rdf:Property + rdfs:Class , owl:Class + , dpv-owl:Likelihood
    Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood +
    in Range of dpv-owl:hasLikelihood +
    Range includes risk-owl:Incident -
    DefinitionIndicates an incident is associated with the specified contextLevel where Likelihood is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-levels
    -
    -

    has risk source

    + +
    +

    Very Low Risk

    - + - + - + + + + + - - + + + + + + + - - - - - - - - - + - + + + + @@ -27034,71 +29053,84 @@

    has risk source

    - + - + + + + - +
    TermhasRiskSourceVeryLowRisk Prefix risk-owl
    Labelhas risk sourceVery Low Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#hasRiskSource
    - https://w3id.org/dpv/risk#hasRiskSource + https://w3id.org/dpv/risk/owl/#VeryLowRisk
    + https://w3id.org/dpv/risk#VeryLowRisk
    Type rdf:Property + rdfs:Class , owl:Class + , dpv-owl:RiskLevel
    Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel +
    in Range of dpv-owl:hasRiskLevel +
    Domain includes dpv-owl:Risk -
    Range includes risk-owl:RiskSource -
    DefinitionIndicates the risk (subject) has the indicated risk source (object)Level where Risk is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-levels
    -
    -

    has threat source

    + +
    +

    Very Low Severity

    - + - + - + + + + + - - + + + + + + + - - - - - - - - - + - + + + + @@ -27109,84 +29141,105 @@

    has threat source

    - + - + + + + - +
    TermhasThreatSourceVeryLowSeverity Prefix risk-owl
    Labelhas threat sourceVery Low Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#hasThreatSource
    - https://w3id.org/dpv/risk#hasThreatSource + https://w3id.org/dpv/risk/owl/#VeryLowSeverity
    + https://w3id.org/dpv/risk#VeryLowSeverity
    Type rdf:Property + rdfs:Class , owl:Class + , dpv-owl:Severity
    Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity +
    in Range of dpv-owl:hasSeverity +
    Domain includes risk-owl:Threat -
    Range includes risk-owl:ThreatSource -
    DefinitionIndicates the threat (subject) has the indicated source (object)Level where Severity is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2024-02-142022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-levels
    -
    -

    has vulnerability

    + + + +
    +

    Violating Code of Conduct

    - + - + - + + + - + - - - - + - + - + + + + - + + + + - + - - + + + + + + + + - +
    TermhasVulnerabilityViolatingCodeOfConduct Prefix risk-owl
    Labelhas vulnerabilityViolating Code of Conduct
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#hasVulnerability
    - https://w3id.org/dpv/risk#hasVulnerability + https://w3id.org/dpv/risk/owl/#ViolatingCodeOfConduct
    + https://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Type rdf:Property + rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ViolatingObligation +
    Range includes risk-owl:Vulnerability -
    DefinitionIndicates the associated context (subject) has indicated vulnerability (object)Something that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    @@ -27196,35 +29249,2841 @@

    has vulnerability

    +
    +

    Violation of Contractual Obligation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingContractualObligationPrefixrisk-owl
    LabelViolation of Contractual Obligation
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ViolatingContractualObligation
    + https://w3id.org/dpv/risk#ViolatingContractualObligation +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ViolatingObligation +
    DefinitionSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    +
    +

    Violating Ethics Code

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingEthicsCodePrefixrisk-owl
    LabelViolating Ethics Code
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ViolatingEthicsCode
    + https://w3id.org/dpv/risk#ViolatingEthicsCode +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ViolatingObligation +
    DefinitionSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    +
    +

    Violation of Legal Obligations

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingLegalObligationPrefixrisk-owl
    LabelViolation of Legal Obligations
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ViolatingLegalObligation
    + https://w3id.org/dpv/risk#ViolatingLegalObligation +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ViolatingObligation +
    DefinitionSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    +
    +

    Violating Policy

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingPolicyPrefixrisk-owl
    LabelViolating Policy
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ViolatingPolicy
    + https://w3id.org/dpv/risk#ViolatingPolicy +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ViolatingObligation +
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policy
    Documented inRisk Risk-taxonomy
    +
    + + + +
    +

    Violation of Statutory Obligations

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingStatutoryObligationsPrefixrisk-owl
    LabelViolation of Statutory Obligations
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ViolatingStatutoryObligations
    + https://w3id.org/dpv/risk#ViolatingStatutoryObligations +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ViolatingObligation +
    DefinitionSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    +
    +

    Violence against children

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolenceAgainstChildrenPrefixrisk-owl
    LabelViolence against children
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ViolenceAgainstChildren
    + https://w3id.org/dpv/risk#ViolenceAgainstChildren +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:Harm + → risk-owl:IndividualRisk +
    DefinitionSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + +
    +

    Vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermVulnerabilityPrefixrisk-owl
    LabelVulnerability
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#Vulnerability
    + https://w3id.org/dpv/risk#Vulnerability +
    Type rdfs:Class + , owl:Class +
    in Domain of risk-owl:isExploitedBy, + risk-owl:isVulnerabilityOf +
    in Range of risk-owl:causedByVulnerability, + risk-owl:exploitsVulnerability, + risk-owl:hasVulnerability +
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    Date Created2024-02-14
    Documented inRisk Core
    +
    + +
    +
    +

    Properties

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    caused by threat

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermcausedByThreatPrefixrisk-owl
    Labelcaused by threat
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#causedByThreat
    + https://w3id.org/dpv/risk#causedByThreat +
    Type rdf:Property + , owl:Class +
    Range includes risk-owl:Threat +
    DefinitionIndicates the cause of associated context (subject) was the indicated threat (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + +
    +

    caused by vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermcausedByVulnerabilityPrefixrisk-owl
    Labelcaused by vulnerability
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#causedByVulnerability
    + https://w3id.org/dpv/risk#causedByVulnerability +
    Type rdf:Property + , owl:Class +
    Range includes risk-owl:Vulnerability +
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    exploits vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermexploitsVulnerabilityPrefixrisk-owl
    Labelexploits vulnerability
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#exploitsVulnerability
    + https://w3id.org/dpv/risk#exploitsVulnerability +
    Type rdf:Property + , owl:Class +
    Domain includes risk-owl:Threat +
    Range includes risk-owl:Vulnerability +
    DefinitionIndicates the threat (subject) exploits the indicated vulnerability (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    has control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermhasControlPrefixrisk-owl
    Labelhas control
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#hasControl
    + https://w3id.org/dpv/risk#hasControl +
    Type rdf:Property + , owl:Class +
    Range includes risk-owl:RiskControl +
    DefinitionIndicates the use of specified control
    Examples Using risk controls to express how tech/org measures address the risk (E0071) +
    Date Created2024-02-14
    Documented inDex Core
    +
    + + +
    +

    has incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermhasIncidentPrefixrisk-owl
    Labelhas incident
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#hasIncident
    + https://w3id.org/dpv/risk#hasIncident +
    Type rdf:Property + , owl:Class +
    Range includes risk-owl:Incident +
    DefinitionIndicates an incident is associated with the specified context
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + +
    +

    has risk source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermhasRiskSourcePrefixrisk-owl
    Labelhas risk source
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#hasRiskSource
    + https://w3id.org/dpv/risk#hasRiskSource +
    Type rdf:Property + , owl:Class +
    Domain includes dpv-owl:Risk +
    Range includes risk-owl:RiskSource +
    DefinitionIndicates the risk (subject) has the indicated risk source (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + +
    +

    has threat source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermhasThreatSourcePrefixrisk-owl
    Labelhas threat source
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#hasThreatSource
    + https://w3id.org/dpv/risk#hasThreatSource +
    Type rdf:Property + , owl:Class +
    Domain includes risk-owl:Threat +
    Range includes risk-owl:ThreatSource +
    DefinitionIndicates the threat (subject) has the indicated source (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + +
    +

    has vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermhasVulnerabilityPrefixrisk-owl
    Labelhas vulnerability
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#hasVulnerability
    + https://w3id.org/dpv/risk#hasVulnerability +
    Type rdf:Property + , owl:Class +
    Range includes risk-owl:Vulnerability +
    DefinitionIndicates the associated context (subject) has indicated vulnerability (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    is exploited by

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermisExploitedByPrefixrisk-owl
    Labelis exploited by
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#isExploitedBy
    + https://w3id.org/dpv/risk#isExploitedBy +
    Type rdf:Property + , owl:Class +
    Domain includes risk-owl:Vulnerability +
    Range includes risk-owl:Threat +
    DefinitionIndicates the vulnerability (subject) is exploited by the indicated threat (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + +
    +

    is vulnerability of

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermisVulnerabilityOfPrefixrisk-owl
    Labelis vulnerability of
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#isVulnerabilityOf
    + https://w3id.org/dpv/risk#isVulnerabilityOf +
    Type rdf:Property + , owl:Class +
    Domain includes risk-owl:Vulnerability +
    DefinitionIndicates the vulnerability (subject) is associated with indicated context (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    refers to risk

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermrefersToRiskPrefixrisk-owl
    Labelrefers to risk
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#refersToRisk
    + https://w3id.org/dpv/risk#refersToRisk +
    Type rdf:Property + , owl:Class +
    Domain includes dpv-owl:Incident +
    Range includes dpv-owl:Risk +
    DefinitionIndicates the incident (subject) is a materialisation of the indicated risk (object)
    Examples Using DPV and RISK extension to represent incidents (E0069) +
    Date Created2024-02-14
    Documented inDex Core
    +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -27304,150 +32163,12 @@

    has vulnerability

    -
    -

    is exploited by

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermisExploitedByPrefixrisk-owl
    Labelis exploited by
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#isExploitedBy
    - https://w3id.org/dpv/risk#isExploitedBy -
    Type rdf:Property - , owl:Class -
    Domain includes risk-owl:Vulnerability -
    Range includes risk-owl:Threat -
    DefinitionIndicates the vulnerability (subject) is exploited by the indicated threat (object)
    Date Created2024-02-14
    Documented inRisk Core
    -
    -
    -

    is vulnerability of

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermisVulnerabilityOfPrefixrisk-owl
    Labelis vulnerability of
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#isVulnerabilityOf
    - https://w3id.org/dpv/risk#isVulnerabilityOf -
    Type rdf:Property - , owl:Class -
    Domain includes risk-owl:Vulnerability -
    DefinitionIndicates the vulnerability (subject) is associated with indicated context (object)
    Date Created2024-02-14
    Documented inRisk Core
    -
    @@ -27582,116 +32303,138 @@

    is vulnerability of

    -
    -

    refers to risk

    - - - - - - - - - - - - - - - - - - - - - - - + +
    +

    The following external concepts are re-used within DPV:

    +

    External

    + + - -
    - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - -
    TermrefersToRiskPrefixrisk-owl
    Labelrefers to risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#refersToRisk
    - https://w3id.org/dpv/risk#refersToRisk -
    Type rdf:Property - , owl:Class -
    Domain includes dpv-owl:Incident -
    Range includes dpv-owl:Risk -
    DefinitionIndicates the incident (subject) is a materialisation of the indicated risk (object)
    Examples Using DPV and RISK extension to represent incidents (E0069) -
    Date Created2024-02-14
    Documented inDex Core
    -
    + + + + + + + + + + + + + + + + + + + @@ -27699,70 +32442,88 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + @@ -27771,64 +32532,82 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + @@ -27837,410 +32616,433 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - -
    -
    -

    The following external concepts are re-used within DPV:

    -

    External

    - + + + + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + - + - + - + @@ -28248,59 +33050,54 @@

    External

    + - - - - - + - - - + - + - + - + - + @@ -28311,6 +33108,7 @@

    External

    + @@ -28326,138 +33124,140 @@

    External

    - - + - + - + - + - - - - - - + - - - - - + - + + + - + - + + + + + + + + + + + + + - - - + @@ -28475,59 +33275,99 @@

    External

    - - - - + - - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -28550,6 +33390,7 @@

    External

    + @@ -28558,7 +33399,6 @@

    External

    - @@ -28694,6 +33534,7 @@

    External

    + @@ -28733,17 +33574,11 @@

    External

    - - - - - - @@ -28759,6 +33594,7 @@

    External

    + @@ -28792,88 +33628,86 @@

    External

    - + - - + - + - - - - + - - - - + + + + + + - + - + - + - + - + @@ -28882,31 +33716,31 @@

    External

    - + - + - + - + - + @@ -28915,220 +33749,178 @@

    External

    - - + - + - - - - + - - - + + - + - - - - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - + - - - - + - - + - - - @@ -29152,22 +33944,37 @@

    External

    + + + + + + + + + + + + + + + diff --git a/2.1-dev/risk/risk-owl.jsonld b/2.1-dev/risk/risk-owl.jsonld index 87120786b..574e557dd 100644 --- a/2.1-dev/risk/risk-owl.jsonld +++ b/2.1-dev/risk/risk-owl.jsonld @@ -1,26 +1,14 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -30,7 +18,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -42,20 +30,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -70,9 +62,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.10,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb81ef67053e949d7a297791513c8eab8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -82,7 +80,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -94,20 +92,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", + "@id": "_:Nb81ef67053e949d7a297791513c8eab8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISa Trust Services Security Incidents 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#HaltSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -128,7 +143,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -140,18 +155,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -170,7 +185,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -180,7 +195,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -192,21 +207,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -217,7 +236,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -226,6 +245,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N809a964650274e1ca9c544fb513732ef" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -233,7 +257,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -245,29 +269,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Brute Force Authorisations" } + ] + }, + { + "@id": "_:N809a964650274e1ca9c544fb513732ef", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -275,7 +325,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -287,39 +337,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.64,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -327,7 +364,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -339,21 +376,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -367,9 +408,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Neee39564ca4e493181200a260513b3de" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -379,7 +426,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -391,38 +438,63 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", + "@id": "_:Neee39564ca4e493181200a260513b3de", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -432,7 +504,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -444,20 +516,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Group Attribution Bias" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", + "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -469,12 +560,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -484,13 +581,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -502,77 +593,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Lose of Credibility" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Security Attack" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", + "@id": "https://w3id.org/dpv/risk/owl#DisabilityDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -582,7 +642,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -594,32 +654,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Discrimination against individuals based on physical or mental disabilities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Disability Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -629,7 +697,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -641,21 +709,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -666,7 +739,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N366da704654a4b4682d8de807d0f1bef" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -676,7 +760,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -688,21 +772,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", + "@id": "_:N366da704654a4b4682d8de807d0f1bef", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -718,7 +818,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.18,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -740,43 +840,74 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk/owl#Privacy", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9a05f8103f334714ae1d17fd74ba0730" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -786,10 +917,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -801,43 +929,64 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Data Bias" } ] }, { - "@id": "_:N9a05f8103f334714ae1d17fd74ba0730", + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect the reputation of the organisation" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -848,7 +997,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -858,7 +1018,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -870,27 +1030,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -912,7 +1092,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N23726cdea0d14630a4ffe4716dcd4526" + "@id": "_:N95204127ed924036926f89eb7e5b0678" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -922,10 +1102,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -937,47 +1114,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N23726cdea0d14630a4ffe4716dcd4526", + "@id": "_:N95204127ed924036926f89eb7e5b0678", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -986,35 +1185,54 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is High" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1024,50 +1242,71 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Bias" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", + "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1077,7 +1316,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Bias" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1089,21 +1328,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when humans are processing and interpreting information" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cognitive Bias" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1117,15 +1356,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N04c587cd11ad4a1396432371d68b3776" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1135,16 +1368,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1156,37 +1380,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N04c587cd11ad4a1396432371d68b3776", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1208,7 +1419,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd42bbf88bc3c4a50bd0d7b206c79060e" + "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1218,7 +1429,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1230,53 +1441,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Sexual Violence" } ] }, { - "@id": "_:Nd42bbf88bc3c4a50bd0d7b206c79060e", + "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1284,14 +1494,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1301,44 +1503,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "exploits vulnerability" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/domainIncludes": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1348,10 +1557,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1363,110 +1569,93 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "_:N012ac588a7e54adeb3318a3bcf249184" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "System Malfunction" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "accepted" } - ] - }, - { - "@id": "_:N012ac588a7e54adeb3318a3bcf249184", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "ISO/IEC 27005:2018" + "@language": "en", + "@value": "Incident caused due to environmental factors outside human controls" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1477,7 +1666,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1487,7 +1681,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1499,21 +1693,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1535,7 +1735,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6526b82722164e0ba82d77115e7cee0f" + "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1545,16 +1753,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1566,37 +1765,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Data Breach" } ] }, { - "@id": "_:N6526b82722164e0ba82d77115e7cee0f", + "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1610,15 +1809,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1a900148ee964d84bdb0f1dbecd9c525" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1628,7 +1821,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1640,42 +1833,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "_:N1a900148ee964d84bdb0f1dbecd9c525", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1685,7 +1873,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1697,21 +1885,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1722,18 +1910,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nca552bddc5ac4825af27bacd7089da63" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1743,10 +1920,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1758,48 +1932,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "7 Severity Levels" } ] }, { - "@id": "_:Nca552bddc5ac4825af27bacd7089da63", + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } + "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1809,7 +1967,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1821,38 +1979,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1862,7 +2019,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1874,38 +2031,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coverage Bias" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Bias", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1915,7 +2071,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1927,37 +2083,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Bias" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk/owl#AgeDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1967,7 +2116,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1979,32 +2128,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Discrimination based on a person's age, often impacting older or younger individuals" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Age Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://purl.org/dc/terms/modified": [ @@ -2013,11 +2170,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N42dd6eab89e5476c8ce82ee556bb8a47" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2025,13 +2177,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2043,102 +2192,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:N42dd6eab89e5476c8ce82ee556bb8a47", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" + }, { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2146,7 +2223,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Misuse" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2158,69 +2235,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", + "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2230,7 +2270,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2242,21 +2282,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Implicit Bias" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2278,7 +2321,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9017bb64e79f426e9b3be47b09cd93ea" + "@id": "_:N6ec056b8005a44a48b4e0542b09105e6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2288,10 +2331,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2303,53 +2343,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "_:N9017bb64e79f426e9b3be47b09cd93ea", + "@id": "_:N6ec056b8005a44a48b4e0542b09105e6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.80,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2359,7 +2394,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2371,21 +2406,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2401,7 +2436,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2411,7 +2446,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2423,23 +2458,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2447,7 +2487,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2459,21 +2499,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2495,7 +2539,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N96a4e2b7a71b485fae480316787e987b" + "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2505,16 +2549,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2526,54 +2561,63 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:N96a4e2b7a71b485fae480316787e987b", + "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N24492f14343b4b90bddc2673a3b6d932" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2583,7 +2627,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2595,31 +2639,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Selection Bias" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "_:N24492f14343b4b90bddc2673a3b6d932", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2631,21 +2696,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "caused by vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2659,9 +2733,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2671,7 +2751,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2683,47 +2763,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", + "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "0.44,xsd:decimal" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2735,21 +2825,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "is exploited by" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2760,7 +2860,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2770,7 +2875,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2782,21 +2887,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2810,17 +2915,6 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6dd3fbc8f83f432bac55bbdc7b5f2fcc" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2828,7 +2922,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2840,55 +2934,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:N6dd3fbc8f83f432bac55bbdc7b5f2fcc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://www.w3.org/TR/json-ld11/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Risk Concepts - JSON-LD serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -2898,28 +2976,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.11,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2927,7 +2992,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2939,38 +3004,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", + "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2980,7 +3044,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2992,18 +3062,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Normality Bias" + "@value": "Moderate Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3022,7 +3098,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3032,7 +3108,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3044,31 +3120,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3078,7 +3160,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3090,26 +3172,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@id": "https://w3id.org/dpv/risk/owl#Misandry", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3119,7 +3205,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3131,21 +3217,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Dislike, contempt, or prejudice against men" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Misandry" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl", + "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3156,7 +3242,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3166,7 +3257,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3178,216 +3275,247 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ + "@value": "http://www.w3.org/2004/02/skos/core" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, { - "@id": "_:N6dc4efe43a844bbe94810084460a3ca2" + "@id": "http://www.w3.org/2002/07/owl" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "@value": "Daniel Doherty" + }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@value": "Georg P. Krog" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Rob Brennan" }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@value": "Delaram Golpayegani" + }, + { + "@value": "Beatriz Esteves" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/creator": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "@value": "Harshvardhan J. Pandit" + }, { "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ] - }, - { - "@id": "_:N6dc4efe43a844bbe94810084460a3ca2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ + "@value": "Julian Flake" + }, { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ + "@language": "en", + "@value": "Delaram Golpayegani" + }, { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ + "@language": "en", + "@value": "Beatriz Esteves" + }, { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/description": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/hasVersion": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/license": [ { - "@language": "en", - "@value": "Control that avoids the risk source" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "2024-08-18" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/publisher": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "_:N656bab82b34a40c7be08764bd11edd1d" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@value": "risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "RISK" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } - ] - }, - { - "@id": "_:N656bab82b34a40c7be08764bd11edd1d", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "2.1-dev" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3406,7 +3534,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3428,21 +3556,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3453,12 +3584,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.25,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3468,13 +3600,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3486,27 +3612,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" + "@value": "Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3520,15 +3646,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2272c3af1d7c4f35878b97cbb8cca1c6" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3538,70 +3658,65 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "_:N2272c3af1d7c4f35878b97cbb8cca1c6", + "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "0.5,xsd:decimal" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3613,43 +3728,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" + "@value": "Moderate Likelihood" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3659,7 +3763,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3671,34 +3775,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Identifier associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3706,7 +3801,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3718,21 +3813,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3748,7 +3843,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3758,7 +3853,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3770,21 +3865,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3806,7 +3907,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na5624c595653415e824cac1cae35b841" + "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3816,7 +3917,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3828,52 +3929,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:Na5624c595653415e824cac1cae35b841", + "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", + "@id": "https://w3id.org/dpv/risk/owl#SourceControl", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3881,6 +3978,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3890,36 +3992,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" + "@value": "Source Control" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3929,7 +4032,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3941,21 +4044,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3966,18 +4069,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7c1ceabcaad149f28fb40302094cf3a4" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3987,13 +4079,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4005,37 +4091,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:N7c1ceabcaad149f28fb40302094cf3a4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4049,15 +4119,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nf44facc76ca548efac72ec065d8591cd" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4067,13 +4131,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4085,34 +4143,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" - } - ] - }, - { - "@id": "_:Nf44facc76ca548efac72ec065d8591cd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4131,7 +4173,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4141,7 +4183,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4153,32 +4195,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4188,7 +4239,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4200,21 +4251,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Selection Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4230,7 +4281,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4240,48 +4291,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4293,42 +4303,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.1,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4338,10 +4347,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4353,27 +4359,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4395,7 +4400,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nce763ffd88464838a749b691f0ba814e" + "@id": "_:N174281b4f06940a18a9e6519d98fa3e3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4405,10 +4410,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4420,37 +4422,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "System Intrusion" } ] }, { - "@id": "_:Nce763ffd88464838a749b691f0ba814e", + "@id": "_:N174281b4f06940a18a9e6519d98fa3e3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4461,7 +4463,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4471,7 +4478,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4483,26 +4490,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N625f03306b04496198a17a1c1fc9f2cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4512,7 +4539,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4524,20 +4551,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Financial Loss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", + "@id": "_:N625f03306b04496198a17a1c1fc9f2cc", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", + "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4549,12 +4592,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4564,7 +4607,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4576,37 +4619,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4616,7 +4654,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4628,44 +4666,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fee", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "DGA 2.10" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4675,33 +4695,37 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4723,7 +4747,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncd20b2bc13904da294945c80012f45d5" + "@id": "_:Nadd5922c22574bd38879939155a85ae3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4733,7 +4757,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4745,37 +4769,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Identity Fraud" } ] }, { - "@id": "_:Ncd20b2bc13904da294945c80012f45d5", + "@id": "_:Nadd5922c22574bd38879939155a85ae3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4786,12 +4810,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.02,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4801,7 +4825,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4813,26 +4837,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Extremely High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 20501:2019" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4842,7 +4887,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4854,29 +4899,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Statistical Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4884,7 +4925,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4896,37 +4937,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk/owl#Incident", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0070" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4936,7 +4989,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4948,53 +5004,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/created": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5003,7 +5045,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5015,30 +5057,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@id": "https://w3id.org/dpv/owl#Incident" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/owl#Risk" } ], "http://purl.org/dc/terms/created": [ @@ -5047,6 +5089,11 @@ "@value": "2024-02-14" } ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5061,46 +5108,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" + "@value": "refers to risk" } ], "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@id": "https://w3id.org/dpv/owl#Incident" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@id": "https://w3id.org/dpv/owl#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5108,6 +5156,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5117,31 +5170,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5152,7 +5195,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5162,7 +5205,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5174,21 +5217,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5198,7 +5245,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5210,43 +5257,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N341572353447495784d70c873b300d32" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5256,10 +5307,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5271,59 +5319,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" - } - ] - }, - { - "@id": "_:N341572353447495784d70c873b300d32", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Non-Normality Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#GenderDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc56cc965e12d4f8a86473ed790bd98d0" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5333,7 +5352,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5345,65 +5364,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Discrimination based on a person's gender identity or gender expression" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" - } - ] - }, - { - "@id": "_:Nc56cc965e12d4f8a86473ed790bd98d0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Gender Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2024-02-14" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0070" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5413,10 +5399,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - }, - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5428,32 +5411,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5463,7 +5451,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5475,38 +5463,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Extremely Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5516,7 +5509,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5528,68 +5524,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data records are not collected randomly from the intended population" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sampling Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Risk is Very High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Very High Risk" + "@value": "Very High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -5600,9 +5541,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5613,12 +5555,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5628,7 +5570,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Status" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5640,21 +5582,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5665,7 +5607,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5675,7 +5617,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5687,18 +5629,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5717,7 +5659,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5739,26 +5681,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", + "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -5780,7 +5725,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5792,21 +5737,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Processing Bias" + "@value": "Informativeness Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5820,9 +5770,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc32ca360a68540de9b7d635beec8d66a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5832,7 +5788,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5844,52 +5800,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Malicious Code Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "_:Nc32ca360a68540de9b7d635beec8d66a", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5900,13 +5841,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5916,7 +5851,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5928,43 +5863,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5974,7 +5907,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5986,20 +5919,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "A limitation or restrictions on the scope or exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -6011,12 +5950,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6026,7 +5965,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6038,20 +5977,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", + "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -6063,12 +6039,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6078,7 +6049,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6090,26 +6061,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -6123,11 +6093,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6137,37 +6102,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk/owl#LanguageDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6177,7 +6140,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6189,21 +6152,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Language Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6214,45 +6176,64 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-29" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "_:Nab5c54b7fa1f4b298dba1eea5aac93db" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@language": "en", + "@value": "Indicates a concept is relevant to 'Availability' in CIA InfoSec model" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Availability Concept" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, + "@language": "en", + "@value": "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6264,54 +6245,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:Nab5c54b7fa1f4b298dba1eea5aac93db", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "has vulnerability" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6321,7 +6290,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6333,23 +6302,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "In-Group Bias" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#NationalityDiscrimination", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6357,7 +6335,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6369,21 +6347,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Discrimination based on a person's nationality or citizenship" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Nationality Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6394,18 +6372,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N9f3682987581455e985c74cb431bb163" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6415,7 +6387,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6427,43 +6399,60 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" + "@value": "Extremely High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "_:N9f3682987581455e985c74cb431bb163", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6474,7 +6463,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6484,7 +6484,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6496,21 +6496,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Copyright Violation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", + "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6526,7 +6542,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.51,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6548,21 +6564,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6578,7 +6594,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6588,7 +6604,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6600,26 +6616,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6629,7 +6656,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6641,32 +6668,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#Misogyny", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6676,7 +6701,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6688,21 +6713,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Dislike, contempt, or prejudice against women" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Misogyny" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6713,7 +6742,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N9d18ac853d6249008536496d60a088cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6723,7 +6763,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6735,26 +6775,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", + "@id": "_:N9d18ac853d6249008536496d60a088cd", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6764,7 +6832,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6776,39 +6844,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk/owl#RightEroded", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.40,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6816,7 +6871,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6828,32 +6883,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "The gradual weakening or reduction of the scope and protection of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Erosion of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-06-11" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6863,7 +6933,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6875,20 +6945,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -6903,9 +6976,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.43,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6915,7 +6994,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6927,27 +7006,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Psychological Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", + "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -6955,6 +7044,12 @@ "@value": "2024-02-14" } ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6962,7 +7057,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6974,18 +7069,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -6993,7 +7088,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-06-12" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7003,7 +7104,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7015,32 +7116,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", + "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7048,11 +7148,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7062,37 +7157,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7102,13 +7206,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7120,29 +7218,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7150,7 +7267,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7162,38 +7279,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", + "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ENISA Threat Landscape 2021" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/url": [ { - "@value": "0.71,xsd:decimal" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsDenial", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7202,7 +7322,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7214,21 +7334,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "The refusal or withholding or denial of the existence or applicability of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Denial of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7239,12 +7369,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.1,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N72f880006766453c8c5284ca9a8c23ae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7254,10 +7390,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7269,29 +7402,64 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" + "@value": "Unauthorised Information Disclosure" } + ] + }, + { + "@id": "_:N72f880006766453c8c5284ca9a8c23ae", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7299,7 +7467,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7311,37 +7479,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", + "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.08,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7351,7 +7539,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7363,21 +7551,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7388,12 +7576,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.01,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7403,7 +7591,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7415,29 +7603,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#ReverseDiscrimination", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7445,16 +7636,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7466,23 +7648,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Reverse Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N05a9ed7355894f6bb37c02c33f9226da" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7490,7 +7699,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7502,21 +7711,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", + "@id": "_:N05a9ed7355894f6bb37c02c33f9226da", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7532,7 +7757,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7542,7 +7767,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7554,37 +7779,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/owl#Risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.01,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7592,11 +7816,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7606,44 +7825,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" + "@value": "has risk source" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/domainIncludes": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@id": "https://w3id.org/dpv/owl#Risk" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N4f1e8d9a5f314a419875e658936b3a20" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7653,7 +7884,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7665,18 +7896,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Response Bias" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", + "@id": "_:N4f1e8d9a5f314a419875e658936b3a20", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7695,7 +7942,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7717,20 +7964,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#HighRisk", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -7742,18 +7989,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nf54ab9e109634d149cb207471dd2ffc5" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7763,13 +8004,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7781,53 +8022,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:Nf54ab9e109634d149cb207471dd2ffc5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "High Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.40,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7837,7 +8072,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7849,37 +8084,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Confounding Variables Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk/owl#Homophobia", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7889,7 +8117,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7901,27 +8129,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "Homophobia" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7931,7 +8169,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7943,38 +8181,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", + "@id": "https://w3id.org/dpv/risk/owl#RacialDiscrimination", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 20501:2019" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7984,7 +8214,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#Racism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7996,21 +8226,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + "@value": "Discrimination against individuals because of their racial background or skin color" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Statistical Bias" + "@value": "Racial Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8026,7 +8256,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8036,7 +8266,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8048,26 +8278,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8077,7 +8312,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8089,43 +8324,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Confidentiality Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#Threat", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8bc9357378f0418c87e2c89b8f5a58b6" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8135,10 +8359,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8150,37 +8371,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" - } - ] - }, - { - "@id": "_:N8bc9357378f0418c87e2c89b8f5a58b6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8191,13 +8396,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8207,7 +8406,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8219,43 +8418,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:Nc28ea8a295b445aca739a464f287a77a" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8265,13 +8486,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8283,53 +8498,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:Nc28ea8a295b445aca739a464f287a77a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.20,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8339,7 +8542,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8351,21 +8554,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Simpson'S Paradox Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8381,7 +8584,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8403,20 +8606,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8428,12 +8631,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8443,13 +8641,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8461,32 +8653,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -8495,12 +8681,6 @@ "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8508,7 +8688,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8520,43 +8700,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk/owl#EthnicDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.49,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8566,7 +8733,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Racism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8578,18 +8745,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Ethnic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8608,7 +8775,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8630,38 +8797,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8671,7 +8841,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8683,43 +8853,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Bias that occurs when humans are processing and interpreting information" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Cognitive Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#IndirectDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2efc2f4438a54dda98fe4b524a7e2ec9" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8729,10 +8886,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8744,37 +8898,82 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Indirect Discrimination" } ] }, { - "@id": "_:N2efc2f4438a54dda98fe4b524a7e2ec9", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.1,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8785,12 +8984,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.48,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8800,7 +8994,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8812,36 +9006,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8a73cba67e0045688727d0972f8b70f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8849,6 +9054,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8858,31 +9068,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" + "@value": "Compromise Account Credentials" } + ] + }, + { + "@id": "_:N8a73cba67e0045688727d0972f8b70f6", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8892,10 +9113,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8907,27 +9125,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8938,7 +9150,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8948,7 +9165,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8960,23 +9177,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8984,10 +9226,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8999,26 +9238,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" + "@value": "Injury" } + ] + }, + { + "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -9041,7 +9294,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1c8ddcb560fa424ca1fe76db29a31820" + "@id": "_:N4a6ecf056dcd484394a81241d36bbc29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9051,7 +9304,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9063,48 +9316,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Identity Theft" } ] }, { - "@id": "_:N1c8ddcb560fa424ca1fe76db29a31820", + "@id": "_:N4a6ecf056dcd484394a81241d36bbc29", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -9120,10 +9376,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9135,37 +9388,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.99,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9175,7 +9432,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9187,26 +9444,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" + "@value": "Rule-Based System Design" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -9218,12 +9478,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6177ab61947545c3b0f993f924c70c28" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9233,16 +9499,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@id": "https://w3id.org/dpv/risk/owl#Harm" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" @@ -9251,91 +9511,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na8ee3a054aaf49f89103a7f1af68d1c7" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes System Intrusion" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "System Intrusion" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:Na8ee3a054aaf49f89103a7f1af68d1c7", + "@id": "_:N6177ab61947545c3b0f993f924c70c28", "@type": [ "https://schema.org/WebPage" ], @@ -9351,10 +9544,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9370,7 +9563,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9392,21 +9585,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9428,7 +9626,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb72f9b0d54644d6ab338feaa339c1f40" + "@id": "_:Nd6abb4f630e44551bf502809758f49c1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9438,10 +9636,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9453,61 +9648,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Sabotage" } ] }, { - "@id": "_:Nb72f9b0d54644d6ab338feaa339c1f40", + "@id": "_:Nd6abb4f630e44551bf502809758f49c1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd579b76a185748d39a9c8fd295a32c6b" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9515,56 +9691,43 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Societal Risk" } ] }, { - "@id": "_:Nd579b76a185748d39a9c8fd295a32c6b", + "@id": "https://w3id.org/dpv/risk/owl#Sexism", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -9573,7 +9736,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9582,40 +9745,44 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "Sexism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N25ef844a62984a848306d378b71152be" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9625,7 +9792,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9637,56 +9804,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:N25ef844a62984a848306d378b71152be", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Coverage Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9694,7 +9832,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9706,20 +9844,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confirmation Bias" + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -9731,12 +9875,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9746,7 +9890,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9758,84 +9902,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.75,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Likelihood is High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -9851,7 +9938,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9863,21 +9950,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9891,9 +9984,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.14,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nedb073eb260845019e04df25c90d654e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9903,7 +10002,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9915,21 +10014,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Security Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", + "@id": "_:Nedb073eb260845019e04df25c90d654e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9943,9 +10062,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.20,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd268380dc1f84dea9ec58ef31331c264" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9955,7 +10080,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9967,20 +10092,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "_:Nd268380dc1f84dea9ec58ef31331c264", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], @@ -10003,7 +10148,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf35def6f3fcb44a2820a83d08bc67c28" + "@id": "_:N636eafbaa808469aa226aaa74ca74855" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10013,51 +10158,58 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:Nf35def6f3fcb44a2820a83d08bc67c28", + "@id": "_:N636eafbaa808469aa226aaa74ca74855", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10069,7 +10221,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -10078,6 +10230,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -10085,7 +10242,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10097,37 +10254,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasIncident", + "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10135,6 +10298,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10144,37 +10312,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10184,7 +10341,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10196,21 +10353,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10224,15 +10381,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N67d2f9f89fab439b8d5965d26bb49159" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10242,10 +10393,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10257,36 +10405,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "_:N67d2f9f89fab439b8d5965d26bb49159", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { @@ -10300,12 +10432,12 @@ ], "http://purl.org/dc/terms/title": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -10315,10 +10447,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10340,7 +10476,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N39150275e13e448ba6b444f5156835f5" + "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10350,10 +10486,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10365,18 +10498,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N39150275e13e448ba6b444f5156835f5", + "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03", "@type": [ "https://schema.org/WebPage" ], @@ -10392,10 +10531,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10409,15 +10548,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb78ad830eb9c4d65a06a2a0dac398849" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10427,55 +10560,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nb78ad830eb9c4d65a06a2a0dac398849", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10486,7 +10600,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N60882207c25442eab9509dc96896d91a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10496,7 +10621,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10508,21 +10633,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Erroneous System Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", + "@id": "_:N60882207c25442eab9509dc96896d91a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10533,7 +10674,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10543,7 +10684,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10555,59 +10696,68 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#RiskControl", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/examples" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that modifies risk" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -10621,7 +10771,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10633,21 +10783,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10661,9 +10814,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.73,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N58c7a823728a4bbc929c09b50030b836" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10673,7 +10832,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10685,32 +10844,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", + "@id": "_:N58c7a823728a4bbc929c09b50030b836", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10720,7 +10889,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10732,20 +10901,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10760,9 +10933,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.80,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N45e627abb33f484ea319253eb043bcd9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10772,7 +10951,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10784,73 +10963,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", + "@id": "_:N45e627abb33f484ea319253eb043bcd9", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.86,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10861,7 +11004,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10871,7 +11019,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10883,21 +11031,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10919,7 +11071,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nef4bef8d59b941d3948be26790d5a59f" + "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10929,57 +11081,71 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nef4bef8d59b941d3948be26790d5a59f", + "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10989,7 +11155,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11001,21 +11167,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighRisk", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11026,12 +11196,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N70af67194f054cbcbe4d1d616683423b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11041,13 +11217,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11059,27 +11229,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" + "@value": "Coercion" + } + ] + }, + { + "@id": "_:N70af67194f054cbcbe4d1d616683423b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -11095,7 +11274,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11107,21 +11286,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11135,15 +11314,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N20794ebbd2e449b2942f8e678d291698" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11153,7 +11326,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11165,42 +11338,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "_:N20794ebbd2e449b2942f8e678d291698", + "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11210,7 +11373,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11222,38 +11385,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", + "@id": "https://w3id.org/dpv/risk/owl#PotentialRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11263,7 +11419,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11275,40 +11431,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + "@value": "Indicates a concept can potentially be a 'risk' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rule-Based System Design" + "@value": "Potential Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + "@value": "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11316,7 +11463,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11328,59 +11475,102 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/owl#Notice" + "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", + "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11399,7 +11589,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11409,7 +11599,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11421,21 +11611,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11449,15 +11639,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb1e4985890f24fbab83393e2ff718b69" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11467,13 +11651,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11485,37 +11663,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" - } - ] - }, - { - "@id": "_:Nb1e4985890f24fbab83393e2ff718b69", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11529,15 +11691,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N127f18629c20469393a6ea549f6434c3" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11547,7 +11703,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11559,37 +11715,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" - } - ] - }, - { - "@id": "_:N127f18629c20469393a6ea549f6434c3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11600,12 +11743,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.1,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11615,10 +11764,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11630,54 +11776,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11688,12 +11819,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.25,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11703,61 +11840,60 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" + "@value": "Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", + "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11767,7 +11903,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11779,21 +11915,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11815,7 +11956,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N37489c12dfc848018493bc0b4ca8a3a2" + "@id": "_:Ne12951e4dd044f82839888833ef1ed00" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11825,10 +11966,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11840,48 +11978,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:N37489c12dfc848018493bc0b4ca8a3a2", + "@id": "_:Ne12951e4dd044f82839888833ef1ed00", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -11890,6 +12031,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11897,7 +12043,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11909,32 +12055,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Denial of Service Attack (DoS)" } + ] + }, + { + "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11944,7 +12106,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11956,21 +12118,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11981,12 +12142,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11996,7 +12152,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12008,21 +12164,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Integrity Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12038,7 +12200,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12060,21 +12222,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12085,12 +12247,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.41,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12100,7 +12257,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12112,27 +12269,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12142,20 +12327,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -12170,15 +12361,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N12b3cae72c654fbba38a4121d80d0971" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12188,7 +12373,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12200,50 +12385,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" - } - ] - }, - { - "@id": "_:N12b3cae72c654fbba38a4121d80d0971", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12251,7 +12410,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12263,20 +12422,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -12288,7 +12447,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12298,7 +12462,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12310,37 +12474,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12350,7 +12503,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12362,21 +12515,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowRisk", + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12390,11 +12543,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12402,13 +12550,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12420,27 +12562,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12451,12 +12587,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.01,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12466,7 +12602,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12478,34 +12614,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12513,7 +12642,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12521,42 +12650,29 @@ "@language": "en", "@value": "accepted" } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Preliminary Report" - } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12566,7 +12682,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12578,32 +12694,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12613,7 +12738,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#Compensation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12625,21 +12750,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12650,12 +12775,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12665,7 +12790,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12677,27 +12802,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12711,9 +12833,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.33,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12723,7 +12851,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12735,43 +12863,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N755a8b0a576543d3877fe747628c7919" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12781,10 +12923,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12796,53 +12935,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:N755a8b0a576543d3877fe747628c7919", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Societal Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk/owl#GeographicDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12852,7 +12968,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12864,20 +12980,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Discrimination based on a person's geographical origin or residence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Geographic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -12889,12 +13004,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.29,xsd:decimal" + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12904,7 +13019,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#Status" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12916,37 +13031,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.61,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12956,7 +13075,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12968,32 +13087,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Group Attribution Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -13002,11 +13124,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N122614f9d61546d49ba0e04b92558751" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -13014,7 +13131,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13026,34 +13143,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" - } - ] - }, - { - "@id": "_:N122614f9d61546d49ba0e04b92558751", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Violation of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13072,7 +13179,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13094,21 +13201,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13119,22 +13230,28 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4cecb70bedcf46ce9f21038688293a9e" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13146,44 +13263,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "_:N4cecb70bedcf46ce9f21038688293a9e", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13193,7 +13309,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13205,43 +13321,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N95637668b675461d9d1c70e1c8be8586" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13251,10 +13365,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13266,62 +13377,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" - } - ] - }, - { - "@id": "_:N95637668b675461d9d1c70e1c8be8586", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -13329,7 +13403,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13341,43 +13415,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbad0a27eb07e4428a3a5c2e24515e416" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13387,7 +13444,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13399,65 +13456,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nbad0a27eb07e4428a3a5c2e24515e416", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N62b691f43380412c8a12872ca763719c" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13467,7 +13500,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13479,37 +13512,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:N62b691f43380412c8a12872ca763719c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13531,7 +13550,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb67e1cacb9d546a69a306d5c1e8456d9" + "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13541,10 +13560,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13556,24 +13572,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" + "@value": "Violating Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:Nb67e1cacb9d546a69a306d5c1e8456d9", + "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0", "@type": [ "https://schema.org/WebPage" ], @@ -13589,9 +13605,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13603,18 +13619,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N27860d33acdb4a848f2b279c6f777606" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13624,64 +13634,93 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" + "@value": "Very High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "_:N27860d33acdb4a848f2b279c6f777606", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", - "@type": [ + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Activity" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Activity" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13691,7 +13730,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13703,38 +13742,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" + "@value": "SexualOrientation Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", + "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13744,7 +13771,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13756,27 +13783,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs in or during requirements creation" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Requirements Bias" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13787,12 +13811,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13802,7 +13827,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13814,36 +13839,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na877a19c74e2458baac027fd4dcf4457" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13853,7 +13889,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13865,55 +13901,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:Na877a19c74e2458baac027fd4dcf4457", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" + "@value": "Requirements Bias" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -13921,7 +13934,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13933,21 +13946,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "Malicious Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13958,7 +13971,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13968,7 +13986,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13980,21 +13998,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14005,21 +14023,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2cdfbe07952b4ea9847ac6e4cc259d4e" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0050e9c8fb8e444391c01a99db38961a" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14029,16 +14038,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14050,53 +14053,73 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Very Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "_:N2cdfbe07952b4ea9847ac6e4cc259d4e", + "@id": "https://w3id.org/dpv/risk/owl#hasIncident", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } - ] - }, - { - "@id": "_:N0050e9c8fb8e444391c01a99db38961a", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates an incident is associated with the specified context" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14110,15 +14133,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Na49aef6e701446fe912e1e7c19c0f7f0" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14128,10 +14145,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14143,54 +14157,84 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "_:Na49aef6e701446fe912e1e7c19c0f7f0", + "@id": "https://w3id.org/dpv/risk/owl#RiskSource", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" - } + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBias", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14200,7 +14244,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Bias" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14212,26 +14256,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Bias" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", + "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -14265,21 +14312,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Out-Group Homogeneity Bias" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14301,7 +14351,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N66f90f2dfdfb46e087830f6c7a2c3ad0" + "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14311,13 +14361,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14329,18 +14373,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N66f90f2dfdfb46e087830f6c7a2c3ad0", + "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908", "@type": [ "https://schema.org/WebPage" ], @@ -14356,57 +14400,36 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Accidental Misuse" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Accidental Misuse" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14416,7 +14439,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14428,39 +14451,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", + "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightObstructed", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -14469,7 +14494,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14481,32 +14506,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + "@value": "Interference with or blocking of the exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confounding Variables Bias" + "@value": "Obstruction of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -14522,7 +14556,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14534,23 +14568,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -14564,7 +14602,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14576,38 +14614,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14617,7 +14654,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14629,68 +14666,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Informativeness Bias" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Risk Assessment" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14700,7 +14724,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14712,13 +14736,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14730,7 +14759,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb72c07b7fa024bcf85183796d36738b4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14740,7 +14780,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14752,43 +14792,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Blackmail" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "_:Nb72c07b7fa024bcf85183796d36738b4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N2b8d3c26b0564a5aa45b8e322c1f789d" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14798,16 +14843,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14819,37 +14855,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" - } - ] - }, - { - "@id": "_:N2b8d3c26b0564a5aa45b8e322c1f789d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14863,15 +14883,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N942a7e9ba5ea4c138c2a2501ac4c3868" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14881,10 +14895,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14896,45 +14907,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ] - }, - { - "@id": "_:N942a7e9ba5ea4c138c2a2501ac4c3868", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14942,7 +14934,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14954,20 +14946,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#PotentialImpact", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14979,18 +14970,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8894f1e1a7aa41ba9422beb0723f99a2" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15000,10 +14980,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15015,37 +14992,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Indicates a concept can potentially be a 'impact' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:N8894f1e1a7aa41ba9422beb0723f99a2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Potential Impact" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15056,12 +15023,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15071,7 +15033,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15083,37 +15045,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk/owl#hasControl", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.20,xsd:decimal" + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15121,11 +15082,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15135,21 +15091,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15163,15 +15124,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ndf05e8ac43fb44f994f8ab3ba8f8b7b6" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15181,7 +15136,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15193,37 +15148,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" - } - ] - }, - { - "@id": "_:Ndf05e8ac43fb44f994f8ab3ba8f8b7b6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15233,7 +15175,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#Misuse" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15245,21 +15187,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15275,7 +15217,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15285,7 +15227,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15297,21 +15239,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15327,7 +15269,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15337,7 +15279,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15349,41 +15291,74 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15391,6 +15366,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15400,31 +15380,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" + "@value": "Lose of Goodwill" } + ] + }, + { + "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/owl#Incident" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15435,18 +15420,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6d8138abcff943f68df0ab565a04a650" + "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15456,10 +15435,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15471,53 +15447,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Risk Analysis" } ] }, { - "@id": "_:N6d8138abcff943f68df0ab565a04a650", + "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "IEC 31010:2019" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.04,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15527,7 +15507,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15539,21 +15519,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Sampling Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk/owl#SexualHarassment", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15563,7 +15546,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15572,41 +15555,34 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Sexual Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#LowRisk", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15616,7 +15592,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15628,38 +15610,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15669,7 +15660,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15681,32 +15672,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Implicit Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15714,11 +15709,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Likelihood" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15728,32 +15718,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "has threat source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -15762,11 +15766,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N50b49b49a3fe4b1ea591c004b74b4453" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15774,10 +15773,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15789,53 +15785,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "_:N50b49b49a3fe4b1ea591c004b74b4453", + "@id": "https://w3id.org/dpv/risk/owl#Transphobia", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15845,7 +15818,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15857,26 +15830,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Transphobia" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15886,7 +15880,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15898,21 +15892,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HaltSource", + "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15923,7 +15935,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N01592d7a5ed64907a324ef43ea425e66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15933,33 +15956,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", + "@id": "_:N01592d7a5ed64907a324ef43ea425e66", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15975,7 +16020,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15997,39 +16042,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk/owl#Harassment", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16037,7 +16069,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16046,65 +16078,70 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Harassment" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16112,6 +16149,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16121,43 +16163,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", + "@id": "https://w3id.org/dpv/risk/owl#SexDiscrimination", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16167,7 +16196,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16179,20 +16208,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + "@value": "Discrimination based on a person's biological sex" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Aggregation Bias" + "@value": "Sex Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -16204,12 +16233,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16219,7 +16243,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16231,244 +16255,1874 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that monitors another Control" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Monitor Control" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Fajar Ekaputra" - }, + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { - "@value": "Beatriz Esteves" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Axel Polleres" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Daniel Doherty" - }, + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Rob Brennan" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that monitors a Risk Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Monitor Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@type": [ + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" - }, + } + ], + "http://purl.org/dc/terms/created": [ { - "@value": "Georg P. Krog" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Julio Fernandez" - }, + "@value": "0.1,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Julian Flake" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" }, { - "@value": "Delaram Golpayegani" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Beatriz Esteves" - }, + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Julian Flake" - }, + "@value": "Risk Matrix 5x5" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Paul Ryan" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@value": "Judicial Costs" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to identify characteristics of event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Identification Control" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised System Access" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised System Access" + } + ] + }, + { + "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.40,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Risk (RM5x5 S:2 L:5)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that monitors a Risk Source" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Monitor Risk Source" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@type": [ + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Malware Attack" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Malware Attack" + } + ] + }, + { + "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates a concept can potentially be a 'risk source' concept within an use-case" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Potential RiskSource" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Response Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.80,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM5x5 S:5 L:4)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DirectDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Direct Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Damage" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Risk (RM7x7 S:2 L:3)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The status of a incident is unknown" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Status Unknown" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM7x7 S:3 L:4)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReligiousDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's religious beliefs or practices" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Religious Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the severity of an event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reduce Severity" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsUnfulfilled", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Failure to meet or complete the fulfilment of rights" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unfulfilment of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8626c0b412094a41834e4fa199b449f9" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Illegal Processing of Data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N8626c0b412094a41834e4fa199b449f9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N91553afacd2e4fc881b533ca4457b82b" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Harm" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Physical Assault" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Assault" + } + ] + }, + { + "@id": "_:N91553afacd2e4fc881b533ca4457b82b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Bias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Confidentiality Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Confidentiality Breach" + } + ] + }, + { + "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Human Errors" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Human Errors" + } + ] + }, + { + "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM7x7 S:4 L:6)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + } + ] + }, + { + "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Racism", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Rob Brennan" + "@value": "Prejudice or discrimination against people based on their race" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "Racism" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/hasVersion": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://w3id.org/dpv/risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "2022-08-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2024-08-18" + "@value": "accepted" } ], - "http://purl.org/dc/terms/publisher": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/" + "@language": "en", + "@value": "Control that changes Impact" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@language": "en", + "@value": "Change Impact" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Risk Concepts" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "risk" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Incident caused due to deliberate actions of a human" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" + "@value": "Deliberate Incident" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "2.1-dev" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl" - }, + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Prevent Exercising of Rights" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16482,15 +18136,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbef628fe676e4c9cba3d4a0a1f5c38f0" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16500,10 +18148,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16515,37 +18160,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:Nbef628fe676e4c9cba3d4a0a1f5c38f0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16556,7 +18185,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16566,7 +18200,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16578,38 +18215,87 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reward" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16618,7 +18304,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16627,40 +18313,27 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#CasteDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16670,10 +18343,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16685,27 +18355,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Caste Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16727,7 +18393,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc55af031139a488e867f0d2fc7f4752c" + "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16737,7 +18403,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16749,18 +18415,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" + "@value": "Public Order Breach" } ] }, { - "@id": "_:Nc55af031139a488e867f0d2fc7f4752c", + "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01", "@type": [ "https://schema.org/WebPage" ], @@ -16776,7 +18442,48 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A report describing the detection of a Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Detection Report" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -16817,21 +18524,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16842,18 +18549,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N8e471129d82f468fbaa272011c8a10f7" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16863,10 +18564,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" }, { - "@id": "https://w3id.org/dpv/owl#Impact" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16878,43 +18582,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Moderate Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N8e471129d82f468fbaa272011c8a10f7", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16928,6 +18616,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16935,7 +18628,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16947,26 +18640,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Threat", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16976,7 +18680,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16988,20 +18692,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -17016,9 +18725,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.22,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6eb433c5024843b085be0656a9fc2cbb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17028,7 +18743,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17040,52 +18755,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Spoofing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "_:N6eb433c5024843b085be0656a9fc2cbb", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17096,7 +18799,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -17105,11 +18808,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6e579543453b456ab0c95e8740b1351e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17123,51 +18821,41 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" + "@value": "Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N6e579543453b456ab0c95e8740b1351e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17175,10 +18863,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17186,13 +18871,28 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to detect event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Detection Control" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17214,7 +18914,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb08320fce6334ebaa9882de0de363138" + "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17224,7 +18924,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17236,18 +18936,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:Nb08320fce6334ebaa9882de0de363138", + "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd", "@type": [ "https://schema.org/WebPage" ], @@ -17263,10 +18963,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17277,7 +18977,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17287,7 +18992,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17299,20 +19004,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -17324,12 +19033,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.67,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17339,7 +19049,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17351,21 +19061,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17376,12 +19092,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.36,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17391,7 +19102,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17403,21 +19114,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17431,15 +19142,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Neaf661678b58453aa79ac68fa97e26ba" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17449,16 +19154,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17470,34 +19166,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" - } - ] - }, - { - "@id": "_:Neaf661678b58453aa79ac68fa97e26ba", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17516,7 +19196,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17526,7 +19206,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17538,43 +19218,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7b4acd3bba614ee3a2824e835f2e662d" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17584,7 +19248,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17596,40 +19260,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Recovery Control" } ] }, { - "@id": "_:N7b4acd3bba614ee3a2824e835f2e662d", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -17648,7 +19321,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17658,7 +19331,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17670,23 +19343,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndd18bed776ec45498b139828923f57f1" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17694,44 +19392,60 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Loss of Opportunity" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Lose of Opportunity" } + ] + }, + { + "@id": "_:Ndd18bed776ec45498b139828923f57f1", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Societal Health & Safety" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", + "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17741,7 +19455,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17753,36 +19467,45 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Simpson'S Paradox Bias" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasControl", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17790,52 +19513,67 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" + "@value": "Violation of Contractual Obligation" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PotentialConsequence", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17845,7 +19583,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17857,27 +19595,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Indicates a concept can potentially be a 'consequence concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Potential Consequence" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17891,15 +19629,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N27e59086791f4c86980cec9fada4a055" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17909,10 +19641,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17924,37 +19653,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "_:N27e59086791f4c86980cec9fada4a055", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAssessment", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17965,12 +19709,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.08,xsd:decimal" + "@id": "_:N3a914addd1624a6ab69826c81a0b0778" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17980,7 +19724,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17992,18 +19736,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Risk Matrix" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", + "@id": "_:N3a914addd1624a6ab69826c81a0b0778", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -18027,7 +19787,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18039,20 +19799,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Risk Mitigation Measure that controls the Consequences" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -18064,12 +19823,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18079,7 +19833,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18091,21 +19845,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18119,6 +19873,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -18126,7 +19885,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18138,31 +19897,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18170,6 +19935,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -18179,26 +19949,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAssessment", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18209,12 +19974,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N07141469efbe4cf08bef9803f87f84f2" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18224,7 +19989,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18236,59 +20001,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:N07141469efbe4cf08bef9803f87f84f2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6e1595afe0144aeea2b1f55d8136d0cc" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18298,7 +20030,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18310,34 +20042,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:N6e1595afe0144aeea2b1f55d8136d0cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18356,7 +20072,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18378,20 +20094,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -18406,17 +20122,6 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N793f312abfaf4de08ee115cf262f3de4" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -18424,55 +20129,78 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "_:N793f312abfaf4de08ee115cf262f3de4", + "@id": "https://w3id.org/dpv/risk/owl#ExcellenceDiscrimination", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Excellence Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18488,7 +20216,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18510,20 +20238,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -18535,7 +20263,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18545,7 +20278,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18557,21 +20290,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18593,7 +20332,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncae32b67116f4739be7418755cf32050" + "@id": "_:N01f7495831e241abad48b454e2462d19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18602,9 +20341,6 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -18618,39 +20354,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Compromise Account" } ] }, { - "@id": "_:Ncae32b67116f4739be7418755cf32050", + "@id": "_:N01f7495831e241abad48b454e2462d19", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.32,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -18658,7 +20410,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18670,21 +20422,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18695,7 +20480,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18705,7 +20490,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18717,18 +20502,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Terminated" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -18746,7 +20537,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18758,13 +20549,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "Confidentiality Incident" } ] } diff --git a/2.1-dev/risk/risk-owl.n3 b/2.1-dev/risk/risk-owl.n3 index 93c712a51..877d90a81 100644 --- a/2.1-dev/risk/risk-owl.n3 +++ b/2.1-dev/risk/risk-owl.n3 @@ -126,16 +126,36 @@ risk-owl:AccidentalIncident a rdfs:Class, risk-owl:AccidentalMisuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:UserRisks ; + rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; skos:definition "Accidental Misuse"@en ; skos:prefLabel "Accidental Misuse"@en . +risk-owl:AgeDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's age, often impacting older or younger individuals"@en ; + skos:prefLabel "Age Discrimination"@en . + risk-owl:AuthorisationFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -143,21 +163,33 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en . +risk-owl:AvailabilityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Availability' in CIA InfoSec model"@en ; + skos:prefLabel "Availability Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk-owl:AvailabilityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -180,20 +212,26 @@ risk-owl:AvoidSource a rdfs:Class, risk-owl:Benefit a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Compensation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . risk-owl:Bias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -204,7 +242,11 @@ risk-owl:Bias a rdfs:Class, risk-owl:Blackmail a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -212,15 +254,18 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -228,13 +273,24 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . +risk-owl:CasteDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's caste, a form of social stratification found in some cultures"@en ; + skos:prefLabel "Caste Discrimination"@en . + risk-owl:ChangeConsequence a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -259,7 +315,11 @@ risk-owl:ChangeImpact a rdfs:Class, risk-owl:Coercion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -267,16 +327,18 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:CognitiveBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -287,22 +349,28 @@ risk-owl:CognitiveBias a rdfs:Class, risk-owl:Compensation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:prefLabel "Compensation"@en . risk-owl:ComponentFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -310,10 +378,13 @@ risk-owl:ComponentFailure a rdfs:Class, risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -321,7 +392,13 @@ risk-owl:ComponentMalfunction a rdfs:Class, risk-owl:CompromiseAccount a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -329,17 +406,18 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . risk-owl:CompromiseAccountCredentials a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -347,15 +425,18 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -363,12 +444,22 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . +risk-owl:ConfidentialityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model"@en ; + skos:prefLabel "Confidentiality Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk-owl:ConfidentialityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -380,8 +471,11 @@ risk-owl:ConfidentialityIncident a rdfs:Class, risk-owl:ConfirmationBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -392,8 +486,11 @@ risk-owl:ConfirmationBias a rdfs:Class, risk-owl:ConfoundingVariablesBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -425,7 +522,9 @@ risk-owl:ContainmentControl a rdfs:Class, risk-owl:CopyrightViolation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -433,15 +532,18 @@ risk-owl:CopyrightViolation a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . risk-owl:CoverageBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -461,7 +563,10 @@ risk-owl:CrossBorderIncident a rdfs:Class, risk-owl:Cryptojacking a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -469,15 +574,17 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . risk-owl:Damage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -489,8 +596,11 @@ risk-owl:Damage a rdfs:Class, risk-owl:DataAggregationBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -501,8 +611,11 @@ risk-owl:DataAggregationBias a rdfs:Class, risk-owl:DataBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -513,7 +626,13 @@ risk-owl:DataBias a rdfs:Class, risk-owl:DataBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -523,17 +642,18 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . risk-owl:DataCorruption a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -541,8 +661,7 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -550,8 +669,11 @@ risk-owl:DataCorruption a rdfs:Class, risk-owl:DataProcessingBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -571,7 +693,10 @@ risk-owl:DeliberateIncident a rdfs:Class, risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -579,8 +704,7 @@ risk-owl:DenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -597,7 +721,9 @@ risk-owl:DetectionControl a rdfs:Class, risk-owl:Detriment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -607,21 +733,57 @@ risk-owl:Detriment a rdfs:Class, skos:definition "Something that acts as or causes Detriment"@en ; skos:prefLabel "Detriment"@en . +risk-owl:DirectDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)"@en ; + skos:prefLabel "Direct Discrimination"@en . + +risk-owl:DisabilityDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals based on physical or mental disabilities"@en ; + skos:prefLabel "Disability Discrimination"@en . + risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dct:created "2022-08-19"^^xsd:date, + "2024-09-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RiskConcept, + risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Discrimination"@en ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, + "Something that acts as or causes Discrimination"@en ; skos:prefLabel "Discrimination"@en . risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -629,8 +791,7 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:DenialServiceAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -646,7 +807,10 @@ risk-owl:EnvironmentalIncident a rdfs:Class, risk-owl:EnvironmentalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -655,7 +819,11 @@ risk-owl:EnvironmentalRisk a rdfs:Class, risk-owl:EquipmentFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -663,8 +831,7 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -672,7 +839,11 @@ risk-owl:EquipmentFailure a rdfs:Class, risk-owl:EquipmentMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -680,8 +851,7 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -689,7 +859,10 @@ risk-owl:EquipmentMalfunction a rdfs:Class, risk-owl:ErroneousSystemUse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -702,9 +875,38 @@ risk-owl:ErroneousSystemUse a rdfs:Class, skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:prefLabel "Erroneous System Use"@en . +risk-owl:EthnicDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Racism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals based on their ethnicity or cultural heritage"@en ; + skos:prefLabel "Ethnic Discrimination"@en . + +risk-owl:ExcellenceDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Favoritism towards individuals deemed more competent or superior, often at the expense of others"@en ; + skos:prefLabel "Excellence Discrimination"@en . + risk-owl:ExposureToHarmfulSpeech a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -720,7 +922,8 @@ risk-owl:ExposureToHarmfulSpeech a rdfs:Class, risk-owl:ExternalSecurityThreat a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -729,7 +932,11 @@ risk-owl:ExternalSecurityThreat a rdfs:Class, risk-owl:Extorsion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -737,8 +944,7 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -821,22 +1027,12 @@ risk-owl:ExtremelyLowSeverity a rdfs:Class, skos:prefLabel "Extremely Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1"@en . -risk-owl:Fee a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source "DGA 2.10"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; - sw:term_status "modified"@en ; - skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; - skos:prefLabel "Fee"@en . - risk-owl:FinancialImpact a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -845,7 +1041,10 @@ risk-owl:FinancialImpact a rdfs:Class, risk-owl:FinancialLoss a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -860,7 +1059,11 @@ risk-owl:FinancialLoss a rdfs:Class, risk-owl:Fraud a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -868,16 +1071,44 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . +risk-owl:GenderDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's gender identity or gender expression"@en ; + skos:prefLabel "Gender Discrimination"@en . + +risk-owl:GeographicDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's geographical origin or residence"@en ; + skos:prefLabel "Geographic Discrimination"@en . + risk-owl:GroupAttributionBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -897,9 +1128,23 @@ risk-owl:HaltSource a rdfs:Class, skos:definition "Control that halts the risk source or prevents it from materialising"@en ; skos:prefLabel "Halt Source"@en . +risk-owl:Harassment a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Harm ; + sw:term_status "accepted"@en ; + skos:prefLabel "Harassment"@en . + risk-owl:Harm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -955,9 +1200,25 @@ risk-owl:HighSeverity a rdfs:Class, skos:prefLabel "High Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1"@en . +risk-owl:Homophobia a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SexualOrientationDiscrimination ; + sw:term_status "accepted"@en ; + skos:definition "Hostility or prejudice against individuals who are or are perceived to be homosexual"@en ; + skos:prefLabel "Homophobia"@en . + risk-owl:HumanErrors a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -982,7 +1243,11 @@ risk-owl:IdentificationControl a rdfs:Class, risk-owl:IdentityFraud a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -990,15 +1255,18 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1006,15 +1274,16 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1041,8 +1310,11 @@ risk-owl:ImpactControl a rdfs:Class, risk-owl:ImplicitBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1053,8 +1325,11 @@ risk-owl:ImplicitBias a rdfs:Class, risk-owl:InGroupBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1297,16 +1572,35 @@ risk-owl:IncidentTerminated a rdfs:Class, skos:definition "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring"@en ; skos:prefLabel "Incident Terminated"@en . +risk-owl:IndirectDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified"@en ; + skos:prefLabel "Indirect Discrimination"@en . + risk-owl:IndividualHealthSafety a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; skos:prefLabel "Individual Health & Safety"@en . risk-owl:IndividualRisk a rdfs:Class, - owl:Class ; + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; @@ -1314,8 +1608,11 @@ risk-owl:IndividualRisk a rdfs:Class, risk-owl:InformativenessBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1326,7 +1623,10 @@ risk-owl:InformativenessBias a rdfs:Class, risk-owl:Injury a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1334,19 +1634,33 @@ risk-owl:Injury a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Injury"@en ; skos:prefLabel "Injury"@en . risk-owl:IntegrityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en . +risk-owl:IntegrityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model"@en ; + skos:prefLabel "Integrity Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk-owl:IntegrityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -1358,16 +1672,23 @@ risk-owl:IntegrityIncident a rdfs:Class, risk-owl:IntentionalMisuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:UserRisks ; + rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; skos:definition "Intentional Misuse"@en ; skos:prefLabel "Intentional Misuse"@en . risk-owl:InterceptCommunications a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1375,8 +1696,7 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; @@ -1384,25 +1704,46 @@ risk-owl:InterceptCommunications a rdfs:Class, risk-owl:JudicialCosts a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:FinancialLoss ; sw:term_status "accepted"@en ; skos:definition "Something that involves or causes judicial costs to be paid"@en ; skos:prefLabel "Judicial Costs"@en . risk-owl:JudicialPenalty a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:FinancialLoss ; sw:term_status "accepted"@en ; skos:definition "Something that involves or causes judicial penalties to be paid"@en ; skos:prefLabel "Judicial Penalty"@en . +risk-owl:LanguageDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; + skos:prefLabel "Language Discrimination"@en . + risk-owl:LegalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -1411,7 +1752,10 @@ risk-owl:LegalRisk a rdfs:Class, risk-owl:LoseCredibility a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1426,7 +1770,10 @@ risk-owl:LoseCredibility a rdfs:Class, risk-owl:LoseCustomerConfidence a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1441,7 +1788,10 @@ risk-owl:LoseCustomerConfidence a rdfs:Class, risk-owl:LoseGoodwill a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1456,7 +1806,10 @@ risk-owl:LoseGoodwill a rdfs:Class, risk-owl:LoseNegotiatingCapacity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1471,7 +1824,10 @@ risk-owl:LoseNegotiatingCapacity a rdfs:Class, risk-owl:LoseOpportunity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1486,7 +1842,10 @@ risk-owl:LoseOpportunity a rdfs:Class, risk-owl:LoseReputation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1501,7 +1860,10 @@ risk-owl:LoseReputation a rdfs:Class, risk-owl:LoseTrust a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1559,9 +1921,26 @@ risk-owl:LowSeverity a rdfs:Class, skos:prefLabel "Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1"@en . +risk-owl:MaliciousActivity a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "accepted"@en ; + skos:definition "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others"@en ; + skos:prefLabel "Malicious Activity"@en . + risk-owl:MaliciousCodeAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1569,17 +1948,19 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1587,17 +1968,17 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1608,9 +1989,38 @@ risk-owl:MaterialDamage a rdfs:Class, skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk-owl:Misandry a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Dislike, contempt, or prejudice against men"@en ; + skos:prefLabel "Misandry"@en . + +risk-owl:Misogyny a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Dislike, contempt, or prejudice against women"@en ; + skos:prefLabel "Misogyny"@en . + risk-owl:Misuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1743,9 +2153,25 @@ risk-owl:MonitorVulnerabilities a rdfs:Class, skos:definition "Control that monitors a Risk Vulnerability"@en ; skos:prefLabel "Monitor Vulnerabilities"@en . +risk-owl:NationalityDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's nationality or citizenship"@en ; + skos:prefLabel "Nationality Discrimination"@en . + risk-owl:NonMaterialDamage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1758,8 +2184,11 @@ risk-owl:NonMaterialDamage a rdfs:Class, risk-owl:NonNormalityBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1770,8 +2199,11 @@ risk-owl:NonNormalityBias a rdfs:Class, risk-owl:NonResponseBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1782,7 +2214,9 @@ risk-owl:NonResponseBias a rdfs:Class, risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -1791,8 +2225,11 @@ risk-owl:OperationalSecurityRisk a rdfs:Class, risk-owl:OutGroupHomogeneityBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1803,19 +2240,25 @@ risk-owl:OutGroupHomogeneityBias a rdfs:Class, risk-owl:Payment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:prefLabel "Payment"@en . risk-owl:PersonalSafetyEndangerment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1830,7 +2273,11 @@ risk-owl:PersonalSafetyEndangerment a rdfs:Class, risk-owl:PhishingScam a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1838,15 +2285,17 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1854,22 +2303,72 @@ risk-owl:PhysicalAssault a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . risk-owl:PhysicalHarm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:prefLabel "Physical Harm"@en . +risk-owl:PotentialConsequence a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'consequence concept within an use-case"@en ; + skos:prefLabel "Potential Consequence"@en ; + skos:scopeNote "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialImpact a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'impact' concept within an use-case"@en ; + skos:prefLabel "Potential Impact"@en ; + skos:scopeNote "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialRisk a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'risk' concept within an use-case"@en ; + skos:prefLabel "Potential Risk"@en ; + skos:scopeNote "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialRiskSource a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'risk source' concept within an use-case"@en ; + skos:prefLabel "Potential RiskSource"@en ; + skos:scopeNote "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + risk-owl:Privacy a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; @@ -1877,7 +2376,10 @@ risk-owl:Privacy a rdfs:Class, risk-owl:PsychologicalHarm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1885,14 +2387,16 @@ risk-owl:PsychologicalHarm a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2901,6 +3405,32 @@ risk-owl:RM7x7S7L7 a rdfs:Class, skos:definition "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High"@en ; skos:prefLabel "Extremely High Risk (RM7x7 S:7 L:7)"@en . +risk-owl:RacialDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Racism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals because of their racial background or skin color"@en ; + skos:prefLabel "Racial Discrimination"@en . + +risk-owl:Racism a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Prejudice or discrimination against people based on their race"@en ; + skos:prefLabel "Racism"@en . + risk-owl:RecoveryControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -2945,18 +3475,34 @@ risk-owl:ReductionControl a rdfs:Class, risk-owl:Reidentification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . +risk-owl:ReligiousDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's religious beliefs or practices"@en ; + skos:prefLabel "Religious Discrimination"@en . + risk-owl:RemedyControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -3002,7 +3548,10 @@ risk-owl:RemoveSource a rdfs:Class, risk-owl:Renumeration a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3014,7 +3563,10 @@ risk-owl:Renumeration a rdfs:Class, risk-owl:ReputationalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -3023,8 +3575,11 @@ risk-owl:ReputationalRisk a rdfs:Class, risk-owl:RequirementsBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3034,34 +3589,95 @@ risk-owl:RequirementsBias a rdfs:Class, skos:prefLabel "Requirements Bias"@en ; skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . +risk-owl:ReverseDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality"@en ; + skos:prefLabel "Reverse Discrimination"@en . + risk-owl:Reward a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:prefLabel "Reward"@en . +risk-owl:RightEroded a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:prefLabel "Erosion of Rights"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightObstructed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:prefLabel "Obstruction of Rights"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightsDenial a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:prefLabel "Denial of Rights"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk-owl:RightsExercisePrevention a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; + skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; skos:prefLabel "Prevent Exercising of Rights"@en ; - skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsImpact a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3069,38 +3685,56 @@ risk-owl:RightsImpact a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Impact, - risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Impact to Rights"@en ; skos:prefLabel "Impact to Rights"@en ; - skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsLimitation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Limitation of Rights"@en ; + skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; skos:prefLabel "Limitation of Rights"@en ; - skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightsUnfulfilled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Failure to meet or complete the fulfilment of rights"@en ; + skos:prefLabel "Unfulfilment of Rights"@en ; + skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsViolation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; skos:prefLabel "Violation of Rights"@en ; - skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RiskAnalysis a rdfs:Class, owl:Class ; @@ -3204,8 +3838,11 @@ risk-owl:RiskSource a rdfs:Class, risk-owl:RuleBasedSystemDesign a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3217,7 +3854,12 @@ risk-owl:RuleBasedSystemDesign a rdfs:Class, risk-owl:Sabotage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3225,17 +3867,18 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:SamplingBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3246,7 +3889,11 @@ risk-owl:SamplingBias a rdfs:Class, risk-owl:Scam a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3254,27 +3901,34 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . risk-owl:SecurityAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . risk-owl:SecurityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3282,18 +3936,18 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . risk-owl:SelectionBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3302,9 +3956,62 @@ risk-owl:SelectionBias a rdfs:Class, skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; skos:prefLabel "Selection Bias"@en . +risk-owl:SexDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's biological sex"@en ; + skos:prefLabel "Sex Discrimination"@en . + +risk-owl:Sexism a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping"@en ; + skos:prefLabel "Sexism"@en . + +risk-owl:SexualHarassment a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Harm ; + sw:term_status "accepted"@en ; + skos:prefLabel "Sexual Harassment"@en . + +risk-owl:SexualOrientationDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual"@en ; + skos:prefLabel "SexualOrientation Discrimination"@en . + risk-owl:SexualViolence a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3312,7 +4019,7 @@ risk-owl:SexualViolence a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . @@ -3330,8 +4037,11 @@ risk-owl:ShareRisk a rdfs:Class, risk-owl:SimpsonsParadoxBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3342,7 +4052,10 @@ risk-owl:SimpsonsParadoxBias a rdfs:Class, risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3354,8 +4067,11 @@ risk-owl:SocialDisadvantage a rdfs:Class, risk-owl:SocietalBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3366,7 +4082,10 @@ risk-owl:SocietalBias a rdfs:Class, risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; @@ -3374,7 +4093,10 @@ risk-owl:SocietalHealthSafety a rdfs:Class, risk-owl:SocietalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -3394,29 +4116,31 @@ risk-owl:SourceControl a rdfs:Class, risk-owl:Spoofing a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:prefLabel "Spoofing"@en . risk-owl:StatisticalBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO 20501:2019"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3427,7 +4151,11 @@ risk-owl:StatisticalBias a rdfs:Class, risk-owl:SystemFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3435,8 +4163,7 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -3444,7 +4171,12 @@ risk-owl:SystemFailure a rdfs:Class, risk-owl:SystemIntrusion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3452,17 +4184,18 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3470,8 +4203,7 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -3479,7 +4211,10 @@ risk-owl:SystemMalfunction a rdfs:Class, risk-owl:Terrorism a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3510,9 +4245,28 @@ risk-owl:ThreatSource a rdfs:Class, skos:definition "Source of threat event, including both agent and non-agent sources"@en ; skos:prefLabel "Threat Source"@en . +risk-owl:Transphobia a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms"@en ; + skos:prefLabel "Transphobia"@en . + risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3520,29 +4274,34 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3550,16 +4309,18 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3567,15 +4328,18 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3583,15 +4347,18 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3599,15 +4366,18 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3615,15 +4385,18 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3631,15 +4404,18 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3647,28 +4423,34 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3676,15 +4458,19 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3692,16 +4478,18 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3709,15 +4497,19 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . risk-owl:UnwantedCodeDeletion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3725,16 +4517,19 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3742,16 +4537,18 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3759,15 +4556,16 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk-owl:UserRisks a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -3860,7 +4658,9 @@ risk-owl:VeryLowSeverity a rdfs:Class, risk-owl:ViolatingCodeOfConduct a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3868,7 +4668,7 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; skos:prefLabel "Violating Code of Conduct"@en ; @@ -3876,7 +4676,9 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, risk-owl:ViolatingContractualObligation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3884,7 +4686,7 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; skos:prefLabel "Violation of Contractual Obligation"@en ; @@ -3892,7 +4694,9 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, risk-owl:ViolatingEthicsCode a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3900,7 +4704,7 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; skos:prefLabel "Violating Ethics Code"@en ; @@ -3908,7 +4712,9 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, risk-owl:ViolatingLegalObligation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3916,7 +4722,7 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; skos:prefLabel "Violation of Legal Obligations"@en ; @@ -3924,16 +4730,20 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; skos:prefLabel "Violating Policy"@en . risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3941,7 +4751,7 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; skos:prefLabel "Violation of Statutory Obligations"@en ; @@ -3949,7 +4759,10 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, risk-owl:ViolenceAgainstChildren a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3957,7 +4770,7 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Child Violence"@en ; skos:prefLabel "Violence against children"@en ; diff --git a/2.1-dev/risk/risk-owl.rdf b/2.1-dev/risk/risk-owl.rdf index 63760dcaa..5827b7801 100644 --- a/2.1-dev/risk/risk-owl.rdf +++ b/2.1-dev/risk/risk-owl.rdf @@ -13,4747 +13,5592 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - + + + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 Harshvardhan J. Pandit + Level where Risk is Extremely Low - 2022-08-17 - Very Low Risk (RM5x5 S:1 L:2) + 0.01,xsd:decimal accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - 0.08,xsd:decimal - + Extremely Low Risk + 2022-08-18 + - + + Re-identification + 2024-08-16 + + + + - - 2024-08-16 - Something that acts as or causes Interception of Communications - Intercept Communications - Harshvardhan J. Pandit - This concept was called "InterceptionCommunications" in DPV 2.0 - - 2022-08-17 - modified - - - - + Something that acts as or causes Re-identification + 2022-08-19 + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-17 + Harshvardhan J. Pandit accepted + + + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + Something that acts as or causes Violation of Statutory Obligations + + - Something that acts as or causes Denial of Service Attack (DoS) - Denial of Service Attack (DoS) + Violation of Statutory Obligations + + 2022-08-17 + modified 2024-08-16 - Harshvardhan J. Pandit - - + + - - - 2024-08-16 - Harshvardhan J. Pandit - 2022-08-17 - Something that acts as or causes Sexual Violence + + 2024-05-19 + + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + - - accepted - Sexual Violence - + Incident Preliminary Report - - Something that acts as or causes Loss of Goodwill - 2022-08-17 + - + + + + - accepted - Lose of Goodwill - 2024-08-16 - Harshvardhan J. Pandit - + 2024-09-13 + ISO/IEC 24027:2021 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + - - + + - 0.99,xsd:decimal - Harshvardhan J. Pandit - 2022-08-18 + Level where Severity is Low + Harshvardhan J. Pandit accepted - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - Extremely High Likelihood - Level where Likelihood is Extremely High - + 2022-08-18 + Low Severity + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + + - - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + + + Scale with 3 Risk Levels from High to Low Harshvardhan J. Pandit - - Moderate Risk accepted 2022-08-18 - 0.5,xsd:decimal - Level where Risk is Moderate - - - + 3 Risk Levels + - - 0.99,xsd:decimal + + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + 2024-08-16 + + - + + + - Level where Risk is Extremely High Harshvardhan J. Pandit - accepted - Extremely High Risk - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 - + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 + - - 2024-05-19 + + accepted + - Incident Handling Report - + 2022-08-18 + Very Low Likelihood + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + Harshvardhan J. Pandit + Level where Likelihood is Very Low - accepted - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + + - - Control that reduces the severity of an event - Reduce Severity + + + - + + + + 2024-08-16 + Harshvardhan J. Pandit - 2024-05-19 + Fraud accepted - + Something that acts as or causes Fraud + 2022-08-17 + - - - - 2024-02-14 - 2024-05-19 + + + + + + accepted - - - - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - Incident - 2024-08-16 - Incident is realised or materialised risk - An actual or occured event + Language Discrimination + Discrimination based on a person's language, often linked to national origin or ethnicity + 2024-09-30 + - - ISO 31073:2022 Risk management vocabulary - - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + + 2022-08-17 + + + + + + 2024-08-16 + + Harshvardhan J. Pandit + Here equipment refers to physical equipment + Equipment Malfunction accepted - 2024-06-12 - Risk Management + Something that acts as or causes Equipment Malfunction + - - Something that acts as or causes Scam - 2024-08-16 - Harshvardhan J. Pandit + + + + - 2022-08-17 + Interference with or blocking of the exercise of rights accepted - - Scam - - + Obstruction of Rights + In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + - + + Risk Matrix 7x7 - + - 2024-05-19 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + Harshvardhan J. Pandit accepted - Control that monitors a Risk Consequence + 2022-08-17 + + + + + + + 2022-08-17 + Low Risk (RM7x7 S:2 L:5) Harshvardhan J. Pandit - Monitor Consequence - + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.20,xsd:decimal + accepted + - - 2024-08-16 - Something that acts as or causes Erroneous System Use - - Erroneous System Use + + modified + + + + + + + + Something that acts as or causes Interception of Communications Harshvardhan J. Pandit + + + Intercept Communications + This concept was called "InterceptionCommunications" in DPV 2.0 2022-08-17 + 2024-08-16 + + + + + + + - + 2024-09-30 + Discrimination based on a person's biological sex + Sex Discrimination accepted - + - - - Fajar Ekaputra - Beatriz Esteves - Axel Polleres - Daniel Doherty - Rob Brennan + Harshvardhan J. Pandit - Georg P. Krog - Julio Fernandez - Julian Flake - Delaram Golpayegani - - - - - - - - - http://www.w3.org/2000/01/rdf-schema - - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - 2.1-dev - - - - https://w3id.org/dpv/risk - 2.1-dev - RISK - - Beatriz Esteves - Julian Flake - Paul Ryan - Delaram Golpayegani - Harshvardhan J. Pandit - Georg P. Krog - Rob Brennan - - https://w3id.org/dpv/risk# - - - - 2022-08-14 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - Risk Concepts - - 2024-08-18 - risk - - http://purl.org/ontology/bibo/status/published - 2022-08-14 - - - - - - ISO/IEC 24027:2021 + 0.5,xsd:decimal + 2022-08-18 - 2024-09-13 - accepted - Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - Non-Normality Bias - Daniel Doherty - - - - + - 2024-08-16 - Something that acts as or causes Unauthorised Code Access - Harshvardhan J. Pandit - 2022-08-17 - Unauthorised Code Access - - + Moderate Likelihood accepted - - - + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Level where Likelihood is Moderate + + + - - Scale with 5 Likelihood Levels from Very High to Very Low - + + Non-Response Bias + 2024-09-13 + ISO/IEC 24027:2021 + + + + - Harshvardhan J. Pandit + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit accepted - 2022-08-18 - 5 Likelihood Levels - + - - 2022-08-17 - + + + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + 2022-08-17 + Moderate Risk (RM3x3 S:2 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - High Risk (RM3x3 S:3 L:2) - 0.67,xsd:decimal - accepted Harshvardhan J. Pandit + 0.44,xsd:decimal + accepted - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - Something that acts as or causes Violation of Code of Conduct - + + This concept was called "ChildViolence" in DPV 2.0 + + + + - modified - - 2024-08-16 - This concept was called "ViolationCodeConduct" in DPV 2.0 - Violating Code of Conduct + Something that acts as or causes Child Violence + Harshvardhan J. Pandit + + accepted + Violence against children 2022-08-17 - + - - + + 2024-09-13 + Sampling Bias accepted + + + + - 2024-05-19 - Incident Detection Report - - A report describing the detection of a Incident + ISO/IEC 24027:2021 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when data records are not collected randomly from the intended population + + - - 0.10,xsd:decimal - + + + - Harshvardhan J. Pandit - Very Low Risk (RM7x7 S:5 L:1) - 2022-08-17 + Concepts associated with security threats that are likely to originate externally accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - + External Security Threat + - - + + + + + - Harshvardhan J. Pandit - 2024-02-14 - accepted - The incident is ongoing i.e. still active - Incident Ongoing - + 2022-03-23 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Something that acts as or causes Detriment + Detriment + 2024-08-16 + - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - + - Harshvardhan J. Pandit - 2022-08-17 + + Availability Incident + 2024-05-19 + Incident where the availability of information or system has been affected - High Risk (RM7x7 S:4 L:4) - 0.33,xsd:decimal accepted - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Harshvardhan J. Pandit - + accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - 2022-08-17 - - accepted - 0.71,xsd:decimal - Extremely High Risk (RM7x7 S:7 L:5) - + + Status associated with an incident + Incident Status + 2024-02-14 - - Harshvardhan J. Pandit - Consequence Control + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - + Non-Normality Bias - 2024-05-19 - Risk Mitigation Measure that controls the Consequences + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading accepted - + 2024-09-13 + ISO/IEC 24027:2021 + - - This concept was called "ImpactToRights" in DPV 2.0 + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + 0.20,xsd:decimal + - + - - Impact to Rights - - accepted - Something that acts as or causes Impact to Rights - 2024-08-16 Harshvardhan J. Pandit + accepted + Low Risk (RM5x5 S:5 L:1) 2022-08-17 - - + - + + Harshvardhan J. Pandit + PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - accepted - Very Low Risk (RM7x7 S:1 L:4) - 0.08,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - Harshvardhan J. Pandit - 2022-08-17 - + Potential Impact + Indicates a concept can potentially be a 'impact' concept within an use-case + + 2024-09-29 - - + + + + + - 0.12,xsd:decimal - Harshvardhan J. Pandit - Very Low Risk (RM5x5 S:1 L:3) - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - accepted + Societal Health & Safety - + accepted + - - Harshvardhan J. Pandit - 2022-08-17 - + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - - Sabotage + 2024-09-13 + Bias that occurs when a human makes an association or assumption based on their mental models and memories accepted - Something that acts as or causes Sabotage - 2024-08-16 - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + Implicit Bias + ISO/IEC 24027:2021 + - - 2022-08-17 + + 2022-03-30 + + + - + + Harshvardhan J. Pandit + 2024-08-16 - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low accepted - Very Low Risk (RM7x7 S:2 L:3) + Something that acts as or causes Damage + Damage + + + + accepted + + + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + + Harshvardhan J. Pandit + 2022-08-18 + + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + + + + Very Low Risk (RM7x7 S:1 L:6) 0.12,xsd:decimal + 2022-08-17 + Harshvardhan J. Pandit + accepted - - Harshvardhan J. Pandit - Confidentiality Breach - 2022-08-17 - Something that acts as or causes Confidentiality Breach + + + + + - + 2024-09-30 + Direct Discrimination accepted - - 2024-08-16 - - + Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + - - Harshvardhan J. Pandit - Something that acts as or causes Public Order Breach - 2022-08-17 - + + + + + + 2022-08-17 + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + 2024-08-16 - + Harshvardhan J. Pandit + Distributed Denial of Service Attack (DDoS) accepted - Public Order Breach - 2024-08-16 - + + - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - High Risk (RM5x5 S:3 L:4) - 0.48,xsd:decimal + + Moderate Risk (RM5x5 S:3 L:2) + 0.24,xsd:decimal 2022-08-17 - Harshvardhan J. Pandit + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate accepted - - - Incident Status - Harshvardhan J. Pandit - + + + + + + - 2024-02-14 + 2022-08-17 + + Harshvardhan J. Pandit + 2024-08-16 - Status associated with an incident + Something that acts as or causes Extorsion + Extorsion accepted + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.iso.org/standard/75281.html - ENISA Reference Incident Classification Taxonomy 2018 + ISO/IEC 27005:2018 - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + Threat accepted - + + Risk source event which causes Risk + 2024-02-14 + + + + + + - 0.67,xsd:decimal - High Risk (RM3x3 S:2 L:3) - Harshvardhan J. Pandit - 2022-08-17 - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - + accepted + 2024-09-13 + Confirmation Bias + ISO/IEC 24027:2021 + - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + 5 Likelihood Levels Harshvardhan J. Pandit - + Scale with 5 Likelihood Levels from Very High to Very Low + 2022-08-18 + - accepted - 0.25,xsd:decimal - 2022-08-18 - Level where Likelihood is Low - Low Likelihood - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - - - + - + + 2022-03-23 + + + - - Something that acts as or causes a compromised account that is then used by the compromiser - 2024-08-16 - Compromise Account - Harshvardhan J. Pandit - 2022-08-17 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + 2024-08-16 accepted - - - - + Benefit + Something that acts as or causes benefits + - - Risk Matrix 5x5 - + + + Harshvardhan J. Pandit + 0.22,xsd:decimal + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + - Harshvardhan J. Pandit - 2022-08-17 - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - accepted - + 2022-08-17 + Low Risk (RM3x3 S:2 L:1) + - - Psychological Harm + + Something that acts as or causes Unauthorised Code Disclosure + accepted + + + + - Harshvardhan J. Pandit - + + Unauthorised Code Disclosure 2022-08-17 - accepted - Something that acts as or causes Psychological Harm + Harshvardhan J. Pandit 2024-08-16 - - + + - + + Moderate Risk (RM5x5 S:3 L:3) + + Harshvardhan J. Pandit + 0.36,xsd:decimal + accepted - 0.73,xsd:decimal - accepted - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - Harshvardhan J. Pandit 2022-08-17 - - + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - + + 2022-08-17 + + + + + 2024-08-16 + Injury + Harshvardhan J. Pandit - 2022-08-17 - 0.80,xsd:decimal + + Something that acts as or causes Injury accepted - - Very High Risk (RM5x5 S:5 L:4) - + - + + + + + - + - Harshvardhan J. Pandit + Component Malfunction - 2022-08-17 + Something that acts as or causes Component Malfunction accepted - 0.31,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - High Risk (RM7x7 S:3 L:5) - + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + - - Violating Policy + + + + + + + 2024-08-16 accepted - Something that acts as or causes violation of policy which can be either internal or external policy - + Harshvardhan J. Pandit + + Something that acts as or causes Unwanted Code Deletion + 2022-08-17 + Unwanted Code Deletion + - + - + + + + - Daniel Doherty - Data Aggregation Bias - Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - ISO/IEC 24027:2021 + 2024-08-16 - 2024-09-13 accepted - + Georg P. Krog, Harshvardhan J. Pandit + 2024-04-14 + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + - + + Harshvardhan J. Pandit accepted - Extremely Low Risk (RM7x7 S:3 L:1) - + + + + + - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.06,xsd:decimal + Scam 2022-08-17 + Something that acts as or causes Scam + 2024-08-16 - + + - + + + + + + - + Something that acts as or causes Phishing Scam + Phishing Scam - accepted - 5 Risk Levels - 2022-08-18 - Scale with 5 Risk Levels from Very High to Very Low Harshvardhan J. Pandit - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + 2024-08-16 + accepted + + 2022-08-17 + - - 0.37,xsd:decimal - + + + + + - Harshvardhan J. Pandit - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - 2022-08-17 accepted - + Judicial Costs + Something that involves or causes judicial costs to be paid + - - Something that acts as or causes Corruption of Data - Harshvardhan J. Pandit - - This concept was called "Corruption Data" in DPV 2.0 - + + + + + + + - Data Corruption - modified - 2022-08-17 2024-08-16 - - - - - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - is exploited by - 2024-02-14 - - - + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised Code Access accepted - + + Unauthorised Code Access + 2022-08-17 + - - 0.44,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - + + + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + 0.16,xsd:decimal Harshvardhan J. Pandit - Moderate Risk (RM3x3 S:2 L:2) + accepted 2022-08-17 + Low Risk (RM5x5 S:1 L:4) - accepted - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + - - + + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + - Moderate Risk (RM7x7 S:7 L:2) - 0.29,xsd:decimal Harshvardhan J. Pandit - 2022-08-17 - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + Low Risk accepted - + 2022-08-18 + Level where Risk is Low + 0.25,xsd:decimal + + + - - accepted - Unauthorised System Access - 2024-08-16 - - Harshvardhan J. Pandit - Something that acts as or causes Unauthorised System Access + + Sexual Violence 2022-08-17 - + + + + + Something that acts as or causes Sexual Violence - - - + 2024-08-16 + Harshvardhan J. Pandit + accepted + + - - 2024-09-13 - ISO/IEC 24027:2021 + + Denial of Rights + + + - + - Rule based system design also potentially introduces various forms of human cognitive bias - Rule-Based System Design accepted - Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - Daniel Doherty - + The refusal or withholding or denial of the existence or applicability of rights + The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + - - Daniel Doherty - Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + + Harshvardhan J. Pandit + - + - ISO/IEC 24027:2021 - - 2024-09-13 + 0.01,xsd:decimal accepted - Confounding Variables Bias - + 2022-08-18 + Level where Likelihood is Extremely Low + Extremely Low Likelihood + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + - + Harshvardhan J. Pandit 2022-08-17 + + accepted + 0.61,xsd:decimal - accepted - - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.12,xsd:decimal - Very Low Risk (RM7x7 S:3 L:2) + Extremely High Risk (RM7x7 S:5 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - Harshvardhan J. Pandit - + + 2022-08-17 + + + - Risk Mitigation Measure that controls Impacts + Public Order Breach + 2024-08-16 + Harshvardhan J. Pandit - 2024-05-19 accepted - Impact Control - + Something that acts as or causes Public Order Breach + + - - 2022-08-17 + + 2024-05-19 + + Control that halts the risk source or prevents it from materialising + Harshvardhan J. Pandit - + - + Halt Source accepted - - 2024-08-16 - Harshvardhan J. Pandit - Something that acts as or causes Unwanted Disclosure of Data - Unwanted Disclosure of Data - - + - - + + + + + - Availability Incident - - 2024-05-19 + Discrimination based on a person's nationality or citizenship + 2024-09-30 + accepted - Incident where the availability of information or system has been affected + Nationality Discrimination + - - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - + + - Harshvardhan J. Pandit + accepted + 0.80,xsd:decimal + Very High Risk (RM5x5 S:5 L:4) 2022-08-17 - 0.16,xsd:decimal - accepted - Low Risk (RM5x5 S:2 L:2) + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - + + Things that cause or have the potential to impact financial resources + + + + + + accepted - + + Financial Impact + + + + + + - Something that acts as or causes Malicious Code Attack - 2024-08-16 - Harshvardhan J. Pandit + Something that acts as or causes Loss of Goodwill 2022-08-17 - Malicious Code Attack + Lose of Goodwill - - - - - - - Something that acts as or causes Unwanted Data Deletion 2024-08-16 - - - - Harshvardhan J. Pandit - Unwanted Data Deletion - - 2022-08-17 + accepted - - - + - + + Harshvardhan J. Pandit - 2022-08-17 - accepted - + - High Risk (RM7x7 S:5 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - 0.41,xsd:decimal - Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + accepted + 0.29,xsd:decimal + Moderate Risk (RM7x7 S:7 L:2) + 2022-08-17 - + + + + + + + - - 0.24,xsd:decimal + 2024-08-16 - accepted - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + Spoofing Harshvardhan J. Pandit - 2022-08-17 - - - - + + Something that acts as or causes Spoofing accepted - 0.22,xsd:decimal - Harshvardhan J. Pandit - - - - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - Low Risk (RM3x3 S:2 L:1) 2022-08-17 - + - - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - Financial Loss - 2024-08-16 - - + + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + 2022-08-17 + + + + Harshvardhan J. Pandit + Erroneous System Use + 2024-08-16 - 2022-08-17 accepted - + + Something that acts as or causes Erroneous System Use + - - + + 2022-08-17 + + + + + - Harshvardhan J. Pandit - Risk Matrix 3x3 - 2022-08-17 - accepted + modified + This concept was called "Corruption Data" in DPV 2.0 + Something that acts as or causes Corruption of Data - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - - - + 2024-08-16 + Harshvardhan J. Pandit - + Data Corruption + + + + + + + + - 2022-08-17 + 2022-08-19 + 2024-09-30 + 2024-08-16 + Georg P. Krog + Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + Something that acts as or causes Discrimination accepted - This concept was called "ChildViolence" in DPV 2.0 - - Something that acts as or causes Child Violence - Violence against children - 2024-08-16 - + Discrimination + + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + 0.57,xsd:decimal + 2022-08-17 + + + Harshvardhan J. Pandit - 2022-08-17 - - + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High accepted - + Very High Risk (RM7x7 S:4 L:7) + + + + Equipment Failure + + + + + - Spoofing + Harshvardhan J. Pandit 2024-08-16 - Something that acts as or causes Spoofing - - - - - - - - 2024-02-14 - - + Here equipment refers to physical equipment accepted - - - has threat source - - Indicates the threat (subject) has the indicated source (object) + Something that acts as or causes Equipment Failure + + 2022-08-17 + - - + + + + + + + + - Something that acts as or provides fees e.g. for using a service - - modified - 2024-04-14 - DGA 2.10 + accepted + Something that acts as or causes Unauthorised Access to Premises + 2022-08-17 + Unauthorised Access to Premises + Harshvardhan J. Pandit 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - Fee - + + + - - Monitor Vulnerabilities - Harshvardhan J. Pandit + + accepted + - - 2024-05-19 - accepted + 2024-02-14 + Harshvardhan J. Pandit - Control that monitors a Risk Vulnerability - + The status of a incident is unknown + Incident Status Unknown + - + + + Human Errors + 2022-08-17 + + + + Something that acts as or causes Human Errors + 2024-08-16 - Something that acts as or causes Personal Safety Endangerment Harshvardhan J. Pandit - - 2022-08-17 accepted - - Personal Safety Endangerment - + - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - Moderate Risk (RM7x7 S:4 L:3) + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + accepted - Harshvardhan J. Pandit 2022-08-17 - accepted - 0.24,xsd:decimal + High Risk (RM7x7 S:4 L:5) + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + 0.41,xsd:decimal - + + + Extremely Low Risk (RM7x7 S:1 L:3) + Harshvardhan J. Pandit + 0.06,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - accepted - Very High Risk (RM7x7 S:4 L:6) - 0.49,xsd:decimal - Harshvardhan J. Pandit 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - - accepted - Something that acts as or causes Detriment + + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + High Risk (RM5x5 S:4 L:3) + + 0.48,xsd:decimal + Harshvardhan J. Pandit - + - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - Detriment - 2024-08-16 - 2022-03-23 - - + accepted + 2022-08-17 + - + + + + - + Operational Security Risk accepted - Risks and issues that have their basis in legal requirements and enforcement - Legal Risk + Risks and issues that arise during operational processes - - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - 2024-02-14 - + + + + + + 2024-08-16 + + Harshvardhan J. Pandit accepted - Incident Mitigated - Harshvardhan J. Pandit - + Lose of Trust + 2022-08-17 + Something that acts as or causes Loss of Trust + - - + + Risks and issues that affect or have the potential to affect specific individuals + + + + Individual Risk accepted - Things that cause or have the potential to impact financial resources - Financial Impact - - - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - - - Harshvardhan J. Pandit - Moderate Risk (RM3x3 S:1 L:3) + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low 2022-08-17 - accepted + 0.08,xsd:decimal - 0.33,xsd:decimal - - - - accepted - + - 0.64,xsd:decimal - Very High Risk (RM5x5 S:4 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High Harshvardhan J. Pandit - - 2022-08-17 - - - - - Documented information about an incident, its handling, assessments,and notifications - Incident Report - 2024-05-19 + Extremely Low Risk (RM7x7 S:2 L:2) accepted + + + + - + Harshvardhan J. Pandit + accepted + 2022-08-18 + + + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + Risk Analysis - + + + + + + Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + The gradual weakening or reduction of the scope and protection of rights accepted - Assessment of risk involving its identification, analysis, and evaluation - - ISO 31073:2022 Risk management vocabulary - 2024-02-14 - Risk Assessment + Erosion of Rights + - - - Risk source event which causes Risk - 2024-02-14 + + 2024-08-16 + + + + + + + + - - Threat + Harshvardhan J. Pandit accepted + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + 2022-08-17 + - - Harshvardhan J. Pandit - Level where Severity is High - + + 2022-08-17 + + + + - 0.75,xsd:decimal - High Severity + Psychological Harm + 2024-08-16 + Something that acts as or causes Psychological Harm + Harshvardhan J. Pandit accepted - 2022-08-18 - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - - - + + - - 2022-08-18 - + + + + + - Harshvardhan J. Pandit - Scale with 7 Severity Levels from Extremely High to Extremely Low - accepted - 7 Severity Levels - + Malicious Activity + Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + accepted + - - Change Impact - Control that changes Impact - Harshvardhan J. Pandit + + + + + + + has threat source + Indicates the threat (subject) has the indicated source (object) + 2024-02-14 + + accepted + + + + + - + + - 2024-05-19 + + Something that acts as or causes Unwanted Disclosure of Data - - - + 2024-08-16 + Harshvardhan J. Pandit accepted - + Unwanted Disclosure of Data + 2022-08-17 + + + + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + High Risk + - Moderate Risk (RM7x7 S:6 L:2) Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - 0.24,xsd:decimal + 0.75,xsd:decimal - 2022-08-17 - + accepted + 2022-08-18 + Level where Risk is High + + + - - + + + Harshvardhan J. Pandit + 0.10,xsd:decimal + - Non-Response Bias + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low accepted - Daniel Doherty - Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - ISO/IEC 24027:2021 - 2024-09-13 - - + Very Low Risk (RM7x7 S:5 L:1) + 2022-08-17 + - - Incident Ongoing Report - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + + + + - - 2024-05-19 accepted + Discrimination against individuals because of their racial background or skin color + Racial Discrimination + 2024-09-30 + - - 2024-02-14 - + + + + + - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit + 2022-08-18 + This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Prevent Exercising of Rights + 2024-08-16 - Incident Status Unknown - The status of a incident is unknown accepted - + Actions or measures that prevent an individual or group from exercising their legal rights. + - - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + + + Harshvardhan J. Pandit + 0.75,xsd:decimal + High Likelihood accepted + 2022-08-18 + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + Level where Likelihood is High + + + - + + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High 2022-08-17 - accepted + 0.67,xsd:decimal - + - Copyright Violation + High Risk (RM3x3 S:2 L:3) - Something that acts as or causes Copyright Violation - - 2024-08-16 Harshvardhan J. Pandit - + accepted + - - Control that removes Impact i.e. prevents it from materialising + + accepted + - + Very High Risk (RM5x5 S:4 L:5) + 0.80,xsd:decimal + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High Harshvardhan J. Pandit - Remove Impact - accepted - 2024-05-19 - + - - 0.71,xsd:decimal - + + accepted + + + + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:5 L:7) + Misandry + 2024-09-30 - 2022-08-17 - accepted - + Dislike, contempt, or prejudice against men + - + + + + + + + Something that acts as or causes Malicious Code Attack + Harshvardhan J. Pandit + accepted - 2022-08-19 - Social Disadvantage - Georg P. Krog + 2022-08-17 + Malicious Code Attack 2024-08-16 - Something that acts as or causes Social Disadvantage - + - - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + + - Harshvardhan J. Pandit - 2022-08-17 - Risk Matrix 7x7 + Harshvardhan J. Pandit + Level where Severity is Extremely High accepted - + 2022-08-18 + Extremely High Severity + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 0.99,xsd:decimal + - - - - - Examples for Data Privacy Vocabulary - - + + https://www.iso.org/standard/72140.html + IEC 31010:2019 + - - + + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 + + + + + Very Low Risk (RM5x5 S:3 L:1) Harshvardhan J. Pandit - Low Risk (RM7x7 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + accepted 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + 0.12,xsd:decimal + + + + + + + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - 0.16,xsd:decimal + Harshvardhan J. Pandit + High Risk (RM7x7 S:3 L:5) accepted + 0.31,xsd:decimal - - + + ISO/IEC 24027:2021 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - Requirements Bias + + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + Confounding Variables Bias accepted - Daniel Doherty 2024-09-13 - - Requirements bias also represents occasions for the human cognitive biases to manifest - ISO/IEC 24027:2021 - Bias that occurs in or during requirements creation - + - + + + - + + - 2022-08-17 accepted - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - 0.10,xsd:decimal - Harshvardhan J. Pandit - + Privacy + - - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - + + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Harshvardhan J. Pandit + - Level where Severity is Very Low accepted + 0.5,xsd:decimal 2022-08-18 - 0.1,xsd:decimal - Very Low Severity - Harshvardhan J. Pandit + Level where Severity is Moderate + Moderate Severity + - - - Harshvardhan J. Pandit - Terrorism - 2022-08-17 - accepted + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + ENISA Threat Landscape for Ransomware Attacks 2022 + + + Extremely Low Severity + - + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + Level where Severity is Extremely Low - 2024-08-16 - Something that acts as or causes Terrorism - + 0.01,xsd:decimal + Harshvardhan J. Pandit + accepted + 2022-08-18 + - - 2022-08-19 - Georg P. Krog - 2024-08-16 - Something that acts as or causes Discrimination - Discrimination + + - + 2022-08-17 + 0.37,xsd:decimal + Harshvardhan J. Pandit + High Risk (RM7x7 S:3 L:6) accepted - + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + - - Accidental Misuse - Accidental Misuse + + 2022-08-17 + Moderate Risk (RM5x5 S:2 L:3) + - + - + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate accepted - + 0.24,xsd:decimal + - + + + An impact assessment associated with a incident + + + Harshvardhan J. Pandit - Very Low Risk (RM5x5 S:3 L:1) + Incident Impact Assessment + 2024-05-19 + accepted + + + 0.12,xsd:decimal 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + Harshvardhan J. Pandit + Very Low Risk (RM5x5 S:1 L:3) accepted - 0.12,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - 2022-08-17 + + 0.02,xsd:decimal - + + Extremely Low Risk (RM7x7 S:1 L:1) + 2022-08-17 - accepted - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - Distributed Denial of Service Attack (DDoS) - 2024-08-16 Harshvardhan J. Pandit - - + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + 2022-08-17 + Very High Risk (RM7x7 S:6 L:5) + - + - - accepted - Something that acts as or causes Loss of Reputation - - 2024-08-16 - Lose of Reputation Harshvardhan J. Pandit - + accepted + 0.61,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + - - ISO/IEC 24027:2021 - 2024-09-13 + + - - In-Group Bias + Potential RiskSource + 2024-09-29 + Harshvardhan J. Pandit accepted - Daniel Doherty - Bias that occurs when showing partiality to one's own group or own characteristics - + Indicates a concept can potentially be a 'risk source' concept within an use-case + PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - + + + + + - + 2022-03-30 + The criteria for what is considered material damage is based in jurisdictional laws and norms + Something that acts as or causes Material Damage - 2022-08-17 - 0.16,xsd:decimal + 2024-08-16 accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - Low Risk (RM5x5 S:1 L:4) + Material Damage Harshvardhan J. Pandit - + - - Recovery Control - + + Discrimination based on a person's geographical origin or residence + + - + + accepted - 2024-05-19 - Control to recover from event - - - - Unauthorised Data Modification - 2024-08-16 - - Harshvardhan J. Pandit - 2022-08-17 - - - + Geographic Discrimination + 2024-09-30 - accepted - Something that acts as or causes Unauthorised Data Modification - - + - + + Something that acts as or causes Unauthorised System Modification + + + + + - - 2024-05-19 - accepted + Unauthorised System Modification + - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising + 2024-08-16 Harshvardhan J. Pandit - + accepted + 2022-08-17 + - - Control that monitors a Risk - Harshvardhan J. Pandit + + - - - Monitor Risk - 2024-05-19 + PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + Harshvardhan J. Pandit accepted - + Indicates a concept can potentially be a 'risk' concept within an use-case + + Potential Risk + 2024-09-29 - - + - 0.36,xsd:decimal - Moderate Risk (RM5x5 S:3 L:3) - Harshvardhan J. Pandit - 2022-08-17 - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - - - - - - - Moderate Risk (RM3x3 S:3 L:1) - Harshvardhan J. Pandit + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + + + + Incident is realised or materialised risk + 2024-02-14 + 2024-05-19 + Incident + An actual or occured event - 0.33,xsd:decimal - 2022-08-17 - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + 2024-08-16 accepted - - - Compensation - 2024-08-16 - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit + + + + + accepted - Something that acts as or provides compensation - which can be monetary and financial or in other forms - + - - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - Risk Matrix - 2024-02-14 + + - + Harshvardhan J. Pandit - accepted - - + Low Risk (RM7x7 S:3 L:3) + 0.18,xsd:decimal + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + - - - - - Control to remedy consequences of event - Remedy Control - 2024-05-19 - accepted + + Indicates the cause of associated context (subject) was the indicated threat (object) + 2024-02-14 - + + accepted + + caused by threat + + - - 0.04,xsd:decimal + - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + 2022-08-17 Harshvardhan J. Pandit - Extremely Low Risk (RM7x7 S:2 L:1) + Very Low Risk (RM7x7 S:6 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - 2022-08-17 accepted + 0.12,xsd:decimal - - accepted - + + 2024-09-30 + + + + - Harm - 2024-08-16 - Something that acts as or causes Harm to humans - This concept refers to the general abstract notion of harm - Harshvardhan J. Pandit - 2022-08-13 - + Prejudice or discrimination against people based on their race + accepted + Racism + - + + + + + accepted 2022-08-17 + Moderate Risk (RM5x5 S:2 L:4) + 0.32,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + Harshvardhan J. Pandit + + + + accepted + Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - accepted - 0.04,xsd:decimal - Extremely Low Risk (RM7x7 S:1 L:2) + 2022-08-17 + 0.86,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Harshvardhan J. Pandit - - Moderate Risk (RM7x7 S:2 L:6) + + accepted - Harshvardhan J. Pandit + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - 0.24,xsd:decimal + 0.99,xsd:decimal + High Risk (RM3x3 S:3 L:3) - accepted - + Harshvardhan J. Pandit + - - + + accepted + - Risks and issues that affect the reputation of the organisation - accepted - Reputational Risk + 2022-08-17 + High Risk (RM7x7 S:7 L:3) + 0.43,xsd:decimal - + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High + - - modified + + + + - Harshvardhan J. Pandit - This concept was called "ViolationStatutoryObligations" in DPV 2.0 + accepted + Something that acts as or causes Harmful Speech + Exposure to Harmful Speech 2022-08-17 - Something that acts as or causes Violation of Statutory Obligations + + This concept was called "HarmfulSpeech" in DPV 2.0 + Harshvardhan J. Pandit 2024-08-16 - - Violation of Statutory Obligations - + - - - - - Extremely Low Risk (RM7x7 S:2 L:2) - Harshvardhan J. Pandit + + Extremely Low Risk (RM7x7 S:1 L:2) - 2022-08-17 - accepted - 0.08,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - - - - High Risk (RM5x5 S:5 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + Harshvardhan J. Pandit - accepted - 0.40,xsd:decimal - Harshvardhan J. Pandit + 0.04,xsd:decimal 2022-08-17 - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + - + + - + 0.14,xsd:decimal + Low Risk (RM7x7 S:1 L:7) + 2022-08-17 Harshvardhan J. Pandit - 2022-08-17 accepted - Something that acts as or causes Loss of Negotiating Capacity - 2024-08-16 - - Lose of Negotiating Capacity - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + - - - - 2024-02-14 - - Indicates the vulnerability (subject) is associated with indicated context (object) + + + + + + + accepted - + Dislike, contempt, or prejudice against women + 2024-09-30 - is vulnerability of + Misogyny + - - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - Harshvardhan J. Pandit - + + + + + + + + + - 7 Likelihood Levels - 2022-08-18 + 2024-08-16 + Something that acts as or causes a compromised account that is then used by the compromiser + Harshvardhan J. Pandit accepted - + 2022-08-17 + Compromise Account + - - Something that acts as or causes Illegal Processing of Data - Illegal Data Processing + + + + - Harshvardhan J. Pandit + 2024-08-16 + Something that acts as or provides payment e.g. to access a service or purchase resources - 2022-08-17 + Payment + Georg P. Krog, Harshvardhan J. Pandit accepted - - This concept was called "IllegalProcessingData" in DPV 2.0 - 2024-08-16 - + 2024-04-14 + - + + Something that acts as or causes Loss of Negotiating Capacity + + + + - - 2022-08-18 - accepted - 7 Risk Levels - Scale with 7 Risk Levels from Extremely High to Extremely Low Harshvardhan J. Pandit - - - - Harshvardhan J. Pandit - 2022-08-17 + 2024-08-16 accepted - Unauthorised Resource Use - Something that acts as or causes Unauthorised Resource Use - + Lose of Negotiating Capacity + + 2022-08-17 + + + + This concept was called "ViolationCodeConduct" in DPV 2.0 + + + + + modified + Harshvardhan J. Pandit 2024-08-16 - - - - - - - - - - Indicates the use of specified control - 2024-02-14 - - accepted - has control - + Something that acts as or causes Violation of Code of Conduct + Violating Code of Conduct + 2022-08-17 + - - 2024-08-16 - Something that acts as or causes Injury + Harshvardhan J. Pandit - 2022-08-17 + 2024-08-16 + + + + + - - - Injury + Sabotage accepted - + Something that acts as or causes Sabotage + 2022-08-17 + + + - - Control to detect event - 2024-05-19 + - + Confidentiality Concept + + 2024-09-29 + Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model - Detection Control + This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact + Harshvardhan J. Pandit accepted - - - - 2022-08-17 + + - + Very High Severity Harshvardhan J. Pandit + Level where Severity is Very High + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 accepted - 2024-08-16 - System Intrusion - Something that acts as or causes System Intrusion - - - - + 2022-08-18 + + - - + + + + + - Harshvardhan J. Pandit + Excellence Discrimination + accepted + 2024-09-30 + + Favoritism towards individuals deemed more competent or superior, often at the expense of others + + + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - 0.32,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + Harshvardhan J. Pandit + High Risk (RM5x5 S:5 L:3) + + + + 0.60,xsd:decimal accepted - Moderate Risk (RM5x5 S:2 L:4) - + accepted - - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - 2024-08-16 - - Here equipment refers to physical equipment - 2022-08-17 - Harshvardhan J. Pandit + + Incident caused due to deliberate actions of a human + Deliberate Incident + 2024-05-19 - - - - ISO 20501:2019 - Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - Daniel Doherty - 2024-09-13 + + 2022-08-18 - + - - Statistical Bias accepted - + Scale with 5 Severity Levels from Very High to Very Low + + Harshvardhan J. Pandit + 5 Severity Levels + - - - - + + 2024-02-14 - Something that involves or causes judicial penalties to be paid accepted - Judicial Penalty - + has incident + + + + + Indicates an incident is associated with the specified context - - 2024-08-16 + Harshvardhan J. Pandit - 2022-08-17 + 2024-08-16 + + + accepted - Something that acts as or causes Unauthorised System Modification - Unauthorised System Modification - - - + 2022-08-17 + + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + - - - + + + + - + + 2024-09-30 + Age Discrimination - 2024-08-16 - Something that acts as or causes Data Breach - Data Breach - Harshvardhan J. Pandit - - 2022-08-17 + Discrimination based on a person's age, often impacting older or younger individuals accepted - - - - + - + + - - ISO/IEC 24027:2021 + Harshvardhan J. Pandit + Scale with 7 Severity Levels from Extremely High to Extremely Low - 2024-09-13 accepted - Sampling Bias - Bias that occurs when data records are not collected randomly from the intended population - Daniel Doherty - + 2022-08-18 + 7 Severity Levels + - - 2024-08-16 - Security Breach - Harshvardhan J. Pandit - Something that acts as or causes Security Breach - 2022-08-17 + + - + - - + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low accepted - - - - + Extremely Low Risk (RM7x7 S:3 L:1) + 0.06,xsd:decimal + 2022-08-17 + - - + + 2022-08-17 + + + + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + Harshvardhan J. Pandit - 2024-05-19 + 2024-08-16 accepted - Monitor Impact - Control that monitors a Risk Impact - Harshvardhan J. Pandit - + + - + - + - accepted - 2022-08-18 - - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - Extremely Low Likelihood + Reduce Likelihood + Control that reduces the likelihood of an event Harshvardhan J. Pandit - 0.01,xsd:decimal - Level where Likelihood is Extremely Low - + 2024-05-19 + + accepted + - + + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - + - + 2024-05-19 accepted - Something that acts as or causes Loss of Trust - Lose of Trust - 2024-08-16 + Share Risk Harshvardhan J. Pandit - 2022-08-17 - + - - Moderate Risk (RM5x5 S:3 L:2) - + + 2022-08-17 + + + + + + Something that acts as or causes Identity Fraud Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - 2022-08-17 - 0.24,xsd:decimal + 2024-08-16 accepted - + Identity Fraud + + - - + + + + + 2022-08-17 + modified + Violation of Contractual Obligation Harshvardhan J. Pandit + 2024-08-16 - Scale with 3 Likelihood Levels from High to Low - 3 Likelihood Levels - accepted - 2022-08-18 - - - - accepted + + Something that acts as or causes Violation of Contractual Obligations + This concept was called "ViolationContractualObligations" in DPV 2.0 + + + + Harshvardhan J. Pandit + + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + + accepted + Very Low Risk (RM5x5 S:1 L:1) + 2022-08-17 + 0.04,xsd:decimal + + + + accepted + 2024-04-14 + + + + - - The criteria for what is considered material damage is based in jurisdictional laws and norms - Something that acts as or causes Non-Material Damage + Something that acts as or provides compensation - which can be monetary and financial or in other forms 2024-08-16 - Non-Material Damage - 2022-03-30 - Harshvardhan J. Pandit - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + Compensation + Georg P. Krog, Harshvardhan J. Pandit + + - - Harshvardhan J. Pandit - 2022-08-17 - 0.61,xsd:decimal + + 2024-05-19 accepted - + A report describing the assessment of an incident in terms of its effects or impacts + Incident Assessment Report + - Very High Risk (RM7x7 S:6 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - - - - - - - - 2024-02-14 - Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + 2022-08-17 + + + + + + - refers to risk - + 2024-08-16 + Harshvardhan J. Pandit + Cryptojacking accepted + Something that acts as or causes Cryptojacking + - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + 2022-08-17 - Low Risk (RM7x7 S:1 L:7) - Harshvardhan J. Pandit + 0.99,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + Harshvardhan J. Pandit accepted - 0.14,xsd:decimal - - - Harshvardhan J. Pandit + + Something that acts as or causes System Intrusion 2022-08-17 - + + + + + + + System Intrusion + - accepted - Fraud - Something that acts as or causes Fraud 2024-08-16 - - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - caused by threat - Indicates the cause of associated context (subject) was the indicated threat (object) - + Harshvardhan J. Pandit accepted - - - - 2024-02-14 - + - - 2024-02-14 + + + + + + + + + + + 2022-08-17 + 2024-08-16 + Harshvardhan J. Pandit + + accepted - - - - Indicates the risk (subject) has the indicated risk source (object) - - - has risk source - + Something that acts as or causes Data Breach + + Data Breach + - - Unauthorised Code Disclosure + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - - Something that acts as or causes Unauthorised Code Disclosure - Harshvardhan J. Pandit - 2022-08-17 + 2024-09-13 + Informativeness Bias + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + ISO/IEC 24027:2021 accepted - - 2024-08-16 - - + - - Incident caused due to environmental factors outside human controls - accepted - - Environmental Incident - 2024-05-19 + + + 2024-08-16 - + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + accepted + Risk Source + + 2024-02-14 - + + + + - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society + 2024-08-16 + A limitation or restrictions on the scope or exercise of rights + This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Georg P. Krog, Harshvardhan J. Pandit + 2022-08-18 accepted - - - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + Limitation of Rights + - + + accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - Harshvardhan J. Pandit - Low Risk (RM5x5 S:4 L:1) 2022-08-17 0.16,xsd:decimal - accepted - + Harshvardhan J. Pandit + Low Risk (RM7x7 S:4 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + - + + + + - Out-Group Homogeneity Bias - Daniel Doherty - Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - ISO/IEC 24027:2021 - 2024-09-13 + 2024-09-30 + Sexism accepted - + Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + - - 2024-08-16 - Harshvardhan J. Pandit + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + 2022-08-17 - Something that acts as or causes Unauthorised Data Access + Harshvardhan J. Pandit + 0.64,xsd:decimal - + + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High accepted - - Unauthorised Data Access - - + - + + 2022-08-17 + Harshvardhan J. Pandit + Very High Risk (RM5x5 S:3 L:5) + - + - accepted - 2024-04-14 - Reward - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + 0.60,xsd:decimal + - - + + + Harshvardhan J. Pandit + - Harshvardhan J. Pandit - Incident Terminated - 2024-02-14 - - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + Avoid Source + Control that avoids the risk source accepted - + 2024-05-19 + - - + + accepted + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + + + - Harshvardhan J. Pandit - 0.20,xsd:decimal - 2022-08-17 - accepted - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - + - - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + + + 2022-08-17 + + + + + + + + 2024-08-16 + Brute Force Authorisations + + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques Harshvardhan J. Pandit - 0.01,xsd:decimal + accepted + + + + + + + 2022-08-17 + 0.57,xsd:decimal + + Harshvardhan J. Pandit + Very High Risk (RM7x7 S:7 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + accepted + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + Source Control - + + Harshvardhan J. Pandit + 2024-05-19 accepted - Level where Risk is Extremely Low - Extremely Low Risk - 2022-08-18 - + Risk Mitigation Measure that controls the Source + - + + Very Low Severity + Harshvardhan J. Pandit - + accepted - Daniel Doherty - Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - ISO/IEC 24027:2021 - 2024-09-13 - Data Bias - + 2022-08-18 + 0.1,xsd:decimal + Level where Severity is Very Low + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + + - - Something that acts as or causes Harmful Speech - 2024-08-16 - + Harshvardhan J. Pandit - 2022-08-17 - Exposure to Harmful Speech + Very Low Risk (RM7x7 S:2 L:3) - + - accepted - This concept was called "HarmfulSpeech" in DPV 2.0 - + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + 0.12,xsd:decimal + 2022-08-17 + + - - Bias that occurs when humans are processing and interpreting information - Daniel Doherty - 2024-09-13 - ISO/IEC 24027:2021 + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + 2022-08-17 + Very High Risk (RM7x7 S:4 L:6) - + - Cognitive Bias + Harshvardhan J. Pandit + 0.49,xsd:decimal accepted - + - + + accepted - 2022-08-18 - 0.25,xsd:decimal - Low Severity - Level where Severity is Low - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 0.75,xsd:decimal + High Severity + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 Harshvardhan J. Pandit - - + Level where Severity is High + + - - Daniel Doherty + + - - 2024-09-13 - Bias that occurs when a human makes an association or assumption based on their mental models and memories - ISO/IEC 24027:2021 + 2022-08-18 + 3 Likelihood Levels + Scale with 3 Likelihood Levels from High to Low + Harshvardhan J. Pandit accepted - Implicit Bias - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + - + Harshvardhan J. Pandit - Re-identification + 2024-08-16 + Copyright Violation + + + - + Something that acts as or causes Copyright Violation accepted - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - Something that acts as or causes Re-identification - 2022-08-19 - 2024-08-16 - - + 2022-08-17 + + - - - - - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Level where Likelihood is Very High - Harshvardhan J. Pandit - Very High Likelihood - - 0.9,xsd:decimal + + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring accepted - 2022-08-18 - - - - - Harshvardhan J. Pandit - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + Incident Mitigated 2024-02-14 - accepted - Incident Suspected + Harshvardhan J. Pandit - - accepted - - - - Low Risk (RM7x7 S:3 L:3) - 0.18,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 2024-08-16 + Harshvardhan J. Pandit + Something that acts as or causes Terrorism - 2022-08-17 - - - - + + + + - Harshvardhan J. Pandit - - Control that changes Consequence + Terrorism accepted - 2024-05-19 - Change Consequence - + 2022-08-17 + + Something that acts as or causes Loss of Credibility 2022-08-17 - Lose of Credibility - + 2024-08-16 + + + + + Lose of Credibility + Harshvardhan J. Pandit accepted - Something that acts as or causes Loss of Credibility - - 2024-08-16 - Harshvardhan J. Pandit + - - Something that acts as or provides renumeration which is in monetary or financial form - - accepted - Remuneration - - - - 2024-04-14 + 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - - - - - - - Monitor Control - Control that monitors another Control - Harshvardhan J. Pandit - 2024-05-19 - accepted - - - - + Unauthorised Information Disclosure + + + + + - 2024-08-16 Harshvardhan J. Pandit + accepted + Something that acts as or causes Unauthorised Information Disclosure + 2022-08-17 - Violating Ethics Code - modified - This concept was called "ViolationEthicalCode" in DPV 2.0 - - - Something that acts as or causes Violation of Ethics Code - + - - Harshvardhan J. Pandit + + - - 2022-08-18 + 2024-02-14 + The state where an incident was almost successful in taking place i.e. "it came very close" + Incident Near Miss + Harshvardhan J. Pandit accepted - 3 Risk Levels - Scale with 3 Risk Levels from High to Low - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - Limitation of Rights - + + + http://www.w3.org/2004/02/skos/core + http://www.w3.org/2000/01/rdf-schema + + https://w3id.org/dpv/risk# + 2022-08-14 + + + + + + + + + RISK + Daniel Doherty + Georg P. Krog + Julian Flake + Fajar Ekaputra + Harshvardhan J. Pandit + Axel Polleres + Julio Fernandez + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + + 2022-08-14 + Harshvardhan J. Pandit + Julian Flake + Delaram Golpayegani + Beatriz Esteves + Rob Brennan + Georg P. Krog + Paul Ryan + 2.1-dev + + + + + + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + http://purl.org/ontology/bibo/status/published + 2.1-dev + + Risk Concepts + 10.5281/zenodo.12505841 + risk + 2024-08-18 + + https://w3id.org/dpv/risk + + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + + 2022-08-17 + + + + + + + Something that acts as or causes Identity Theft + Identity Theft + 2024-08-16 - This concept was called "LimitationOfRights" in DPV 2.0 + Harshvardhan J. Pandit accepted - Something that acts as or causes Limitation of Rights - 2022-08-18 - + - + + Harshvardhan J. Pandit + accepted + + + - + - Harshvardhan J. Pandit - + Impact to Rights 2022-08-17 - accepted - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - 0.20,xsd:decimal - + This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + 2024-08-16 + Something that acts as or causes Impact to Rights + + - + + + + + - 2024-05-19 - Notice associated with an Incident + Failure to meet or complete the fulfilment of rights + Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Unfulfilment of Rights accepted - Incident Notice - + - - High Risk (RM7x7 S:7 L:3) - + + 2022-08-17 + Moderate Risk (RM3x3 S:1 L:3) + + Harshvardhan J. Pandit - 2022-08-17 accepted - 0.43,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + 0.33,xsd:decimal + - - A report describing the suspicion of an incident in the past or occuring - Incident Suspected Report - 2024-05-19 - accepted + + 2024-08-16 + Harshvardhan J. Pandit + + + + + - + + accepted + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + 2022-08-17 + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - + + Out-Group Homogeneity Bias + + + + - + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + 2024-09-13 accepted - Something that acts as or causes Component Malfunction - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - Component Malfunction - - + ISO/IEC 24027:2021 + - + + + - + + + 2024-09-30 + Hostility or prejudice against individuals who are or are perceived to be homosexual accepted - - + Homophobia + - + + + + + + + + 2024-08-16 + Violation of Rights + The infringement or breach of rights in a manner that constitues a 'violation' of those rights + Georg P. Krog, Harshvardhan J. Pandit + accepted + 2022-08-18 + This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + + accepted + + + + + + + + Blackmail + 2022-08-17 + + Something that acts as or causes Blackmail Harshvardhan J. Pandit + 2024-08-16 + + + 2022-08-17 - Something that acts as or causes Unwanted Code Deletion - Unwanted Code Deletion - + + + + + + Harshvardhan J. Pandit + 2024-08-16 + accepted - - - - + Something that acts as or causes Authorisation Failure + Authorisation Failure + - - - Containment Control + + Control that reduces the likelihood or severity of an event 2024-05-19 + accepted - Control to contain event + Reduction Control - - 0.86,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + - Harshvardhan J. Pandit 2022-08-17 - Extremely High Risk (RM7x7 S:7 L:6) + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:2 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate accepted + 0.29,xsd:decimal - - - - 2024-02-14 - accepted - - - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - caused by vulnerability - - - - - - Extremely Low Severity - 0.01,xsd:decimal - Harshvardhan J. Pandit - accepted - 2022-08-18 - - Level where Severity is Extremely Low - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - - - - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - + + Georg P. Krog, Harshvardhan J. Pandit accepted - + + + + + 2024-04-14 + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + 2024-08-16 - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of - Component Failure - Something that acts as or causes Component Failure - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - + - + + + + + + - + 2022-08-19 - 2022-08-17 + Unauthorised Re-Identification + 2024-08-16 accepted - High Risk (RM7x7 S:3 L:6) - 0.37,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - Harshvardhan J. Pandit - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - Harshvardhan J. Pandit - - Phishing Scam - 2022-08-17 - - - - - accepted - Something that acts as or causes Phishing Scam - 2024-08-16 - - + Georg P. Krog + Something that acts as or causes Unauthorised Re-Identification + - - - - - Harshvardhan J. Pandit - - Something that acts as or causes Blackmail - 2022-08-17 + accepted - Blackmail - - 2024-08-16 - - - - - 0.29,xsd:decimal + 0.24,xsd:decimal + Moderate Risk (RM7x7 S:4 L:3) - Harshvardhan J. Pandit - Moderate Risk (RM7x7 S:2 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + Harshvardhan J. Pandit - accepted - - Deliberate Incident - - - 2024-05-19 - accepted - - - Incident caused due to deliberate actions of a human - - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 - - 2024-02-14 + + + 2022-08-17 + High Risk (RM5x5 S:3 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + 0.48,xsd:decimal + Harshvardhan J. Pandit accepted - - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - Vulnerability + - - Harshvardhan J. Pandit - 2022-08-17 - + + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + High Risk (RM7x7 S:4 L:4) + 2022-08-17 + Harshvardhan J. Pandit accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - Extremely High Risk (RM7x7 S:7 L:7) - 0.99,xsd:decimal + 0.33,xsd:decimal - - + + 2024-09-30 + + + + accepted - Coverage Bias - Daniel Doherty - Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - ISO/IEC 24027:2021 - 2024-09-13 - + Discrimination based on a person's caste, a form of social stratification found in some cultures + Caste Discrimination + - - accepted - + + - Identity Fraud - - 2024-08-16 - Harshvardhan J. Pandit - Something that acts as or causes Identity Fraud - 2022-08-17 - - - - - Here equipment refers to physical equipment - Something that acts as or causes Equipment Failure - 2024-08-16 - Equipment Failure - - - - Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - 2022-08-17 + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:3 L:4) accepted - - - + 0.24,xsd:decimal + - + + + + accepted + + + is exploited by + + + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + 2024-02-14 + + + - 0.51,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - Harshvardhan J. Pandit - Very High Risk (RM7x7 S:5 L:5) 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + Low Risk (RM5x5 S:1 L:5) + Harshvardhan J. Pandit + 0.20,xsd:decimal accepted - + - + + + + - Authorisation Failure - + 2024-08-16 Harshvardhan J. Pandit - Something that acts as or causes Authorisation Failure - 2022-08-17 + Denial of Service Attack (DoS) + accepted - - - - + Something that acts as or causes Denial of Service Attack (DoS) + 2022-08-17 + - + + + Incident Register Harshvardhan J. Pandit + A register recording incidentes, their reports, notifications, and other related activities + 2024-05-19 - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - Level where Risk is Low - accepted - 0.25,xsd:decimal - Low Risk - 2022-08-18 - - - - - - - - Guides for Data Privacy Vocabulary - - - - + Harshvardhan J. Pandit + + - - 2022-08-17 - - Something that acts as or causes System Failure accepted - Here system refers to both hardware and software systems - 2024-08-16 - System Failure - - - + 2022-08-18 + Scale with 7 Risk Levels from Extremely High to Extremely Low + 7 Risk Levels + - + + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + Very Low Risk (RM5x5 S:2 L:1) + 2022-08-17 + 0.08,xsd:decimal Harshvardhan J. Pandit - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High accepted - 0.60,xsd:decimal - Very High Risk (RM5x5 S:3 L:5) - - Lose of Customer Confidence + + + + + Harshvardhan J. Pandit + Low Risk (RM3x3 S:1 L:2) + accepted 2022-08-17 + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + 0.22,xsd:decimal + + + + + + + - - - Something that acts as or causes Loss of Customer Confidence + ISO 20501:2019 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + 2024-09-13 + Statistical Bias accepted - 2024-08-16 - + - - Integrity Incident - + + 2022-08-17 + + + + + - 2024-05-19 - Incident where the integrity of information or system has been affected + + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised Resource Use + 2024-08-16 accepted + Unauthorised Resource Use + - - Unauthorised Access to Premises - 2022-08-17 - + + + + + + + + accepted - 2024-08-16 - Something that acts as or causes Unauthorised Access to Premises - - Harshvardhan J. Pandit - + Something that acts as or causes Unauthorised Activity + Unauthorised Activity - - - - Harshvardhan J. Pandit - High Likelihood + + + + - - 0.75,xsd:decimal + Legal Risk + + accepted + Risks and issues that have their basis in legal requirements and enforcement + + + accepted 2022-08-18 + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + Level where Likelihood is Extremely High + + + + Extremely High Likelihood + 0.99,xsd:decimal + Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - Level where Likelihood is High - - - + + + + + - + In-Group Bias + ISO/IEC 24027:2021 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when showing partiality to one's own group or own characteristics + 2024-09-13 accepted - Privacy - + - - Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + + + + + + + + accepted + Simpson'S Paradox Bias + 2024-09-13 ISO/IEC 24027:2021 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + 2024-09-13 + Rule-Based System Design + + + + ISO/IEC 24027:2021 + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit accepted - Daniel Doherty - Group Attribution Bias + Rule based system design also potentially introduces various forms of human cognitive bias - - A report describing the assessment of an incident in terms of its effects or impacts + + + + + - Incident Assessment Report - 2024-05-19 - accepted + 2024-09-13 + ISO/IEC 24027:2021 + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Societal Bias + - - 5 Severity Levels - + + 2024-02-14 + caused by vulnerability + + accepted + + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + + + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + - Harshvardhan J. Pandit + Level where Risk is Very High 2022-08-18 + Harshvardhan J. Pandit accepted - Scale with 5 Severity Levels from Very High to Very Low - + Very High Risk + + - + + accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - Harshvardhan J. Pandit - + Extremely Low Risk (RM7x7 S:4 L:1) 2022-08-17 - accepted - 0.16,xsd:decimal - Low Risk (RM7x7 S:2 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + 0.08,xsd:decimal + + Harshvardhan J. Pandit - - accepted - 0.31,xsd:decimal - + + + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate Harshvardhan J. Pandit + accepted + 0.12,xsd:decimal + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low 2022-08-17 - Moderate Risk (RM7x7 S:5 L:3) - - - Level where Likelihood is Moderate + + 2022-08-17 + + + + + + modified + 2024-08-16 + This concept was called "ViolationEthicalCode" in DPV 2.0 Harshvardhan J. Pandit - + + Something that acts as or causes Violation of Ethics Code + Violating Ethics Code + + + + + + + + - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - Moderate Likelihood - 2022-08-18 accepted - 0.5,xsd:decimal - - - + Judicial Penalty + Something that involves or causes judicial penalties to be paid + - - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - High Risk (RM3x3 S:3 L:3) - Harshvardhan J. Pandit - 0.99,xsd:decimal + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low 2022-08-17 - accepted + Low Risk (RM7x7 S:2 L:4) - + 0.16,xsd:decimal + Harshvardhan J. Pandit + accepted + - - + + Containment Control + Control to contain event - + - Harshvardhan J. Pandit + 2024-05-19 - 2022-08-17 accepted - Something that acts as or causes Identity Theft - Identity Theft - 2024-08-16 - - + - + - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - Extremely Low Risk (RM7x7 S:4 L:1) - 0.08,xsd:decimal - Harshvardhan J. Pandit + 0.51,xsd:decimal 2022-08-17 + + Very High Risk (RM7x7 S:5 L:5) + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - + + accepted + + + + + + + + + User Risks + Concepts associated with risks that arise due to User or Human use + + + + + + accepted - + + + 2024-08-16 - Something that acts as or causes Extorsion + + + + + + + + Harshvardhan J. Pandit - Extorsion + accepted + + Something that acts as or causes Unauthorised Data Disclosure + Unauthorised Data Disclosure 2022-08-17 - - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - + + Harshvardhan J. Pandit + - Harshvardhan J. Pandit + 0.08,xsd:decimal accepted - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 - Extremely High Severity - 0.99,xsd:decimal - Level where Severity is Extremely High - + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Very Low Risk (RM5x5 S:1 L:2) + 2022-08-17 + - - Risk Mitigation Measure that uses controls to monitor events - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - Monitor Control + Harshvardhan J. Pandit - 2024-05-19 + + Potential Consequence - - accepted - + Indicates a concept can potentially be a 'consequence concept within an use-case + + PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 - - + + - This concept was called "ViolationOfRights" in DPV 2.0 - accepted - Something that acts as or causes Violation of Rights - 2022-08-18 - Violation of Rights - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:2 L:6) + 2022-08-17 - + Harshvardhan J. Pandit + accepted + 0.24,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + - - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 - - Harshvardhan J. Pandit - + + - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 - accepted - 0.5,xsd:decimal - Level where Severity is Moderate - Moderate Severity - - - - - - 2024-02-14 + 2022-08-17 + 0.40,xsd:decimal - - - has incident - - accepted - Indicates an incident is associated with the specified context - + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Harshvardhan J. Pandit + High Risk (RM5x5 S:2 L:5) + - + - 2024-05-19 - accepted - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - - - Incident Concluding Report - - - Very High Risk (RM5x5 S:4 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - + Harshvardhan J. Pandit + - Harshvardhan J. Pandit - 0.80,xsd:decimal - 2022-08-17 - + 2022-08-18 + Extremely High Risk accepted - + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + Level where Risk is Extremely High + 0.99,xsd:decimal + - - 0.86,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - + + 2022-08-17 + Violation of Legal Obligations + + Something that acts as or causes Violation of Legal Obligations + + + + modified + 2024-08-16 Harshvardhan J. Pandit - 2022-08-17 + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - Extremely High Risk (RM7x7 S:6 L:7) - accepted - + - + 2022-08-17 + Moderate Risk (RM7x7 S:6 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + Harshvardhan J. Pandit + accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - - Very Low Risk (RM7x7 S:1 L:6) - 0.12,xsd:decimal - Harshvardhan J. Pandit + 0.24,xsd:decimal - + + 2022-08-17 + Coercion + + + + + - - Harshvardhan J. Pandit + 2024-08-16 - 2024-05-19 + Harshvardhan J. Pandit accepted - Control that avoids the risk source - Avoid Source - + Something that acts as or causes Coercion + + - - - + + + + + + Lose of Reputation accepted - Monitor Risk Source - Control that monitors a Risk Source + 2022-08-17 + + + 2024-08-16 + Something that acts as or causes Loss of Reputation Harshvardhan J. Pandit - 2024-05-19 - + - - Physical Harm - + + + + + + Environmental Risk accepted - + Risks and issues that have their origin in environment or can affect the environment at large + - - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + - accepted - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - 0.11,xsd:decimal - Harshvardhan J. Pandit + 2022-08-17 - Low Risk (RM3x3 S:1 L:1) - - - Harshvardhan J. Pandit + 2024-08-16 + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification - Very Low Risk - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 accepted + + + + Primer for Data Privacy Vocabulary + + + + + + + + - + - 0.1,xsd:decimal + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + accepted + Level where Likelihood is Very High + 0.9,xsd:decimal 2022-08-18 - Level where Risk is Very Low - - + Very High Likelihood + + - - - Harshvardhan J. Pandit + - + + + + - 2022-08-17 - - Unauthorised Code Modification + 2024-09-13 + ISO/IEC 24027:2021 + Data Aggregation Bias accepted - Something that acts as or causes Unauthorised Code Modification - 2024-08-16 - - + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - - System Malfunction - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + Reputational Risk + Risks and issues that affect the reputation of the organisation accepted - Something that acts as or causes System Malfunction - Here system refers to both hardware and software systems - 2024-08-16 - Harshvardhan J. Pandit - - 2022-08-17 - - + - - Very Low Likelihood - 0.1,xsd:decimal - Level where Likelihood is Very Low - Harshvardhan J. Pandit - + + - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 2022-08-18 + Moderate Risk + Level where Risk is Moderate + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Harshvardhan J. Pandit accepted - - + 0.5,xsd:decimal + + + - + + + + + + + + Harshvardhan J. Pandit + + Something that acts as or causes Physical Assault + accepted + Physical Assault 2022-08-17 - Very Low Risk (RM7x7 S:6 L:1) + 2024-08-16 + + + - accepted - 0.12,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - Harshvardhan J. Pandit - + 2022-08-17 + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + 0.11,xsd:decimal + + Harshvardhan J. Pandit + accepted + - - + + 2024-05-19 + + Harshvardhan J. Pandit + accepted + Remove Consequence + - Harshvardhan J. Pandit - 2022-08-17 - 0.49,xsd:decimal - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + Control that removes Consequence i.e. prevents it from materialising + + + + + + + Impact Control + 2024-05-19 accepted - + Harshvardhan J. Pandit + Risk Mitigation Measure that controls Impacts + - - - 2022-08-17 + accepted - + - Something that acts as or causes Account Credentials to be compromised - - Compromise Account Credentials - 2024-08-16 + Control that changes Consequence + 2024-05-19 + Change Consequence Harshvardhan J. Pandit - - + + - - + + + Risk Concepts - JSON-LD serialiation - Risk Concepts - RDF/XML serialiation - - + + - - Judicial Costs - Something that involves or causes judicial costs to be paid - - - - - accepted - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - Data Processing Bias - Daniel Doherty - 2024-09-13 - Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - + + + + + - ISO/IEC 24027:2021 + 2024-09-30 + Indirect Discrimination + Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified accepted - + - - Share Risk - Harshvardhan J. Pandit - + + A report describing the detection of a Incident + 2024-05-19 - + + Incident Detection Report accepted - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 + + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + 2024-05-19 + Incident Ongoing Report + + + + accepted - - 2022-08-17 - 0.14,xsd:decimal + - + - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - Low Risk (RM7x7 S:7 L:1) + Control that changes Impact + 2024-05-19 + Harshvardhan J. Pandit - + Change Impact + - - Harshvardhan J. Pandit - Something that acts as or causes Malware Attack - 2022-08-17 + + - + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + 7 Likelihood Levels - Malware Attack + Harshvardhan J. Pandit accepted - - 2024-08-16 - - - - + 2022-08-18 + - - Daniel Doherty - Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - ISO/IEC 24027:2021 - - 2024-09-13 - Selection Bias - accepted + + 5 Risk Levels + Scale with 5 Risk Levels from Very High to Very Low + - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + Harshvardhan J. Pandit + + accepted + 2022-08-18 + - - + + Control to recover from event + Recovery Control + + accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - 0.61,xsd:decimal - Harshvardhan J. Pandit - - 2022-08-17 - Extremely High Risk (RM7x7 S:5 L:6) - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + 2024-05-19 + - - Harshvardhan J. Pandit - 2022-08-17 - accepted + + + 2024-05-19 + Incident Concluding Report + - - - Something that acts as or causes Unauthorised Information Disclosure - - Unauthorised Information Disclosure - 2024-08-16 - - - - - - - - - - Risk Concepts - JSON-LD serialiation + accepted + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - Harshvardhan J. Pandit - modified - + + + + + - 2022-08-17 - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - Something that acts as or causes Violation of Legal Obligations - Violation of Legal Obligations 2024-08-16 - + Harshvardhan J. Pandit + accepted + Something that acts as or causes Non-Material Damage + 2022-03-30 + Non-Material Damage + The criteria for what is considered material damage is based in jurisdictional laws and norms - + + + + + - + 2024-09-30 + Discrimination against individuals based on their ethnicity or cultural heritage - 2022-08-17 accepted - Something that acts as or causes Cryptojacking - Cryptojacking - 2024-08-16 - - Harshvardhan J. Pandit - - - - - - - - Risk Concepts - N3 serialiation - - + Ethnic Discrimination + - + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + - - Risks and issues that arise during operational processes + + accepted - + + Incident Report + Documented information about an incident, its handling, assessments,and notifications + 2024-05-19 - Operational Security Risk - accepted - - - Low Risk (RM7x7 S:2 L:5) - + + + + + + Risk Concepts - RDF/XML serialiation + + + + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 0.1,xsd:decimal + + Harshvardhan J. Pandit - 0.20,xsd:decimal - 2022-08-17 + Very Low Risk + 2022-08-18 + accepted + Level where Risk is Very Low + + + + + Incident Notice + 2024-05-19 + + + accepted + Notice associated with an Incident + + + + Remove Impact + + + - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - + accepted + Control that removes Impact i.e. prevents it from materialising + 2024-05-19 + Harshvardhan J. Pandit + - - 0.20,xsd:decimal - + + + + + + Harshvardhan J. Pandit + + Something that acts as or causes Account Credentials to be compromised + 2024-08-16 + accepted + Compromise Account Credentials + 2022-08-17 + + + + + Malware Attack + + + + + + + + 2022-08-17 + Something that acts as or causes Malware Attack + + 2024-08-16 + Harshvardhan J. Pandit accepted - Low Risk (RM5x5 S:5 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - + - - Very High Risk + + + + + + + + + accepted + Intentional Misuse + Intentional Misuse + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Something that acts as or causes Unauthorised System Access + 2022-08-17 + + + + + + + + + + + 2024-08-16 Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + accepted + Unauthorised System Access + + + + Physical Harm + + + + - - 2022-08-18 - 0.9,xsd:decimal accepted - Level where Risk is Very High - - + - - Something that acts as or causes Violation of Contractual Obligations - Violation of Contractual Obligation + + Risk Mitigation Measure that uses controls to monitor events + 2024-05-19 + Harshvardhan J. Pandit - This concept was called "ViolationContractualObligations" in DPV 2.0 + + + + Monitor Control + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + accepted + + + + 2024-05-19 + + Control that modifies risk + Risk Control + + + + accepted + + + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + accepted + + + + Control that removes the risk source + 2024-05-19 + Harshvardhan J. Pandit + + Remove Source + + + + + + + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types 2022-08-17 + Harshvardhan J. Pandit + Risk Matrix 5x5 + + accepted + + + + + + + + Control to detect event + 2024-05-19 + accepted + Detection Control + + + + + + + + + + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + + accepted + 2024-09-13 + ISO/IEC 24027:2021 + Bias + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + 2024-02-14 + Harshvardhan J. Pandit + + Incident Terminated + accepted + + + + 2024-02-14 + + Harshvardhan J. Pandit + The incident has halted or paused with a high likelihood of resuming or recurring + + + + accepted + Incident Halted + + + + Harshvardhan J. Pandit + + + + + accepted + Risk Mitigation Measure that controls the Consequences + Consequence Control + 2024-05-19 + + + + + + + + + + 2024-09-13 + accepted + ISO/IEC 24027:2021 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Requirements bias also represents occasions for the human cognitive biases to manifest + Bias that occurs in or during requirements creation + Requirements Bias + + + + + + + 2024-05-19 + + Harshvardhan J. Pandit + Monitor Vulnerabilities + Control that monitors a Risk Vulnerability + accepted + + + + + + + - modified - + Harassment + accepted + + + + 2024-02-14 + + + accepted + Indicates the vulnerability (subject) is associated with indicated context (object) + is vulnerability of + + + + + + + + + + + + 2024-09-30 + Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + SexualOrientation Discrimination + + accepted + + + + + + accepted + + + + 2024-02-14 + Indicates the associated context (subject) has indicated vulnerability (object) + has vulnerability + + + 2024-09-29 + This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact + Availability Concept + + Harshvardhan J. Pandit + + + accepted + + Indicates a concept is relevant to 'Availability' in CIA InfoSec model + + + + + + + + + + 2022-08-17 + Something that acts as or causes System Malfunction + System Malfunction + 2024-08-16 - + accepted + Harshvardhan J. Pandit + Here system refers to both hardware and software systems + + - + + + + Indicates the incident (subject) is a materialisation of the indicated risk (object) + 2024-02-14 + + + refers to risk + + accepted + + + + + + Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + + + + + + + 2024-09-30 + + accepted + Reverse Discrimination + + + + + + + + + + + + accepted + Component Failure + Something that acts as or causes Component Failure + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + + + + Control to identify characteristics of event + 2024-05-19 + + + + Identification Control + accepted + + + + Low Likelihood + 0.25,xsd:decimal + Level where Likelihood is Low + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + + + + accepted + 2022-08-18 + + + + + + + Incident caused due to accidental actions arising from human or human-controlled situations + Accidental Incident + + 2024-05-19 + + accepted + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + + accepted + Religious Discrimination + Discrimination based on a person's religious beliefs or practices + 2024-09-30 + + + + + + + + + + accepted + 2024-09-13 ISO/IEC 24027:2021 + Bias that occurs when humans are processing and interpreting information + Cognitive Bias + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + High Risk (RM7x7 S:5 L:4) + 2022-08-17 + + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + Harshvardhan J. Pandit + accepted + 0.41,xsd:decimal + + + + + + + + Harshvardhan J. Pandit + accepted + 0.04,xsd:decimal + 2022-08-17 + Extremely Low Risk (RM7x7 S:2 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + + + + + has control + 2024-02-14 + + - 2024-09-13 + + Indicates the use of specified control accepted - Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - Bias - Daniel Doherty - - + + 2024-02-14 - High Risk (RM5x5 S:5 L:3) - accepted - + - 0.60,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - 2022-08-17 + accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + Incident Concluded + - - Payment - + + + + + + 2024-06-11 + Delaram Golpayegani - accepted - Something that acts as or provides payment e.g. to access a service or purchase resources - 2024-04-14 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + Something that acts as or causes Misuse + accepted + Misuse + - - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - High Risk - Level where Risk is High + + + Risk Matrix + - - 0.75,xsd:decimal - Harshvardhan J. Pandit + 2024-02-14 accepted - 2022-08-18 - - - - - - A register recording incidentes, their reports, notifications, and other related activities Harshvardhan J. Pandit + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + + + + - Incident Register - - 2024-05-19 + Harshvardhan J. Pandit accepted - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + 2022-08-17 + Very Low Risk (RM7x7 S:1 L:4) + 0.08,xsd:decimal + - - Harshvardhan J. Pandit - 3 Severity Levels - + + + + + + - Scale with 3 Severity Levels from High to Low - 2022-08-18 + Something that acts as or causes Unauthorised Code Modification + 2024-08-16 + Harshvardhan J. Pandit accepted - + + 2022-08-17 + Unauthorised Code Modification + - + + Control to remedy consequences of event + 2024-05-19 + - - 2024-05-19 accepted - Halt Source - Control that halts the risk source or prevents it from materialising - Harshvardhan J. Pandit - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + Remedy Control + - - 0.40,xsd:decimal + - High Risk (RM5x5 S:2 L:5) + 2022-08-17 + 0.40,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + High Risk (RM5x5 S:5 L:2) Harshvardhan J. Pandit - 2022-08-17 accepted - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + + + + accepted + 0.33,xsd:decimal + 2022-08-17 + Moderate Risk (RM3x3 S:3 L:1) + + Harshvardhan J. Pandit + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + + Very High Risk (RM5x5 S:5 L:5) + 2022-08-17 0.99,xsd:decimal - Harshvardhan J. Pandit - 2022-08-17 - accepted + Harshvardhan J. Pandit Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - Very High Risk (RM5x5 S:5 L:5) + accepted - - Concepts associated with risks that arise due to User or Human use - - accepted + + + + + - - User Risks - - - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 - - - - - - - - Risk Concepts - Turtle serialiation - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - 2022-08-17 + Group Attribution Bias + 2024-09-13 accepted - - - - - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure - 2024-08-16 - - + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + ISO/IEC 24027:2021 + - - + + + + + + - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - Harshvardhan J. Pandit + Something that acts as or causes System Failure + 2024-08-16 + System Failure - 2022-08-17 + Harshvardhan J. Pandit + Here system refers to both hardware and software systems accepted - Very Low Risk (RM5x5 S:1 L:1) - 0.04,xsd:decimal - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + 2022-08-17 + - + + + Something that acts as or causes Loss of Customer Confidence + accepted + + + - Societal Health & Safety + Lose of Customer Confidence + 2022-08-17 + 2024-08-16 + Harshvardhan J. Pandit - accepted - + - - + + 2024-05-19 + Control that monitors another Control - + Harshvardhan J. Pandit + Monitor Control + accepted - 2024-08-16 - Harshvardhan J. Pandit - Physical Assault - 2022-08-17 - Something that acts as or causes Physical Assault - - - - Confirmation Bias - Daniel Doherty - ISO/IEC 24027:2021 - 2024-09-13 - Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + + + + accepted + + + + - + Accidental Misuse + Accidental Misuse + + + accepted - + + + + + + + + + + 2022-08-17 + Something that acts as or causes Security Breach + Security Breach + Harshvardhan J. Pandit + 2024-08-16 + + + + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - Security Attack - + + + + + + - Something that acts as or causes an attack on security with the aim of undermining it + Security Attack accepted - + Something that acts as or causes an attack on security with the aim of undermining it - - - - Very High Risk (RM7x7 S:7 L:4) - Harshvardhan J. Pandit - + + 2024-08-16 + + + + - 2022-08-17 - 0.57,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High accepted - + Georg P. Krog + Social Disadvantage + 2022-08-19 + Something that acts as or causes Social Disadvantage + - - 2022-03-30 - Harshvardhan J. Pandit - - accepted - - - - 2024-08-16 - Damage - Something that acts as or causes Damage - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + + + + - + - 0.02,xsd:decimal - Harshvardhan J. Pandit - 2022-08-17 - Extremely Low Risk (RM7x7 S:1 L:1) + Sexual Harassment accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - + - - has vulnerability - - - + + 2024-02-14 - Indicates the associated context (subject) has indicated vulnerability (object) + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + + Vulnerability - accepted - - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - - - + + Source of threat event, including both agent and non-agent sources + + 2024-02-14 + + Threat Source accepted - Daniel Doherty - Informativeness Bias - Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - 2024-09-13 - ISO/IEC 24027:2021 - - - 2024-05-19 - - - - accepted + - Control that removes the risk source - Remove Source - Harshvardhan J. Pandit - - - - Very Low Risk (RM5x5 S:2 L:1) - Harshvardhan J. Pandit - + + + + - - 2022-08-17 accepted - 0.08,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - + Individual Health & Safety + - - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + - - 0.32,xsd:decimal - accepted - Moderate Risk (RM5x5 S:4 L:2) + 0.16,xsd:decimal Harshvardhan J. Pandit + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + Low Risk (RM5x5 S:2 L:2) + 2022-08-17 - - 2024-08-16 - - Harshvardhan J. Pandit - 2022-08-17 + + accepted - + + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + 2024-05-19 + Incident Mitigation Measure - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - accepted - Brute Force Authorisations - - - - + + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + - - - accepted - - Coercion - 2024-08-16 - Something that acts as or causes Coercion - Harshvardhan J. Pandit 2022-08-17 - - + Harshvardhan J. Pandit + accepted + Risk Matrix 3x3 + + - - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + 2024-05-19 - Identifier associated with an incident + Harshvardhan J. Pandit + Control that reduces the severity of an event + Reduce Severity accepted - Incident Identifier + - + - + accepted - accepted - Prevent Exercising of Rights - 2022-08-18 - This concept was called "PreventExercisingOfRights" in DPV 2.0 - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - Something that acts as or causes Prevent Exercising of Rights - + A report describing the suspicion of an incident in the past or occuring + 2024-05-19 + Incident Suspected Report + - - - + - Something that acts as or causes Unauthorised Activity + Incident where the integrity of information or system has been affected + + Integrity Incident + + 2024-05-19 accepted - Unauthorised Activity - - - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - + + Harshvardhan J. Pandit + 0.43,xsd:decimal + + - Harshvardhan J. Pandit - 0.41,xsd:decimal - 2022-08-17 accepted - - High Risk (RM7x7 S:4 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + 2022-08-17 + Very High Risk (RM7x7 S:3 L:7) - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - Primer for Data Privacy Vocabulary - - - - - - Daniel Doherty - 2024-09-13 + + + Incident Ongoing + - - Societal Bias - Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - ISO/IEC 24027:2021 + The incident is ongoing i.e. still active + 2024-02-14 + Harshvardhan J. Pandit accepted - + - - Accidental Incident - Incident caused due to accidental actions arising from human or human-controlled situations - - 2024-05-19 + + + + + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit accepted + 2024-09-13 + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + ISO/IEC 24027:2021 + Data Bias + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - Risk Mitigation Measure that controls the Source - Source Control + - + - Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + 2022-08-17 + Harshvardhan J. Pandit accepted - 2024-05-19 - + 0.31,xsd:decimal + Moderate Risk (RM7x7 S:5 L:3) + - - + + - Harshvardhan J. Pandit + 0.86,xsd:decimal 2022-08-17 - 0.57,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + Extremely High Risk (RM7x7 S:6 L:7) + Harshvardhan J. Pandit accepted - Very High Risk (RM7x7 S:4 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - + + + + + - 2024-02-14 + Gender Discrimination + 2024-09-30 - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + Discrimination based on a person's gender identity or gender expression accepted - Risk Source - 2024-08-16 - - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - - - 2022-08-17 - accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + Harshvardhan J. Pandit - 0.48,xsd:decimal - High Risk (RM5x5 S:4 L:3) - Harshvardhan J. Pandit - + 2022-08-17 + Low Risk (RM7x7 S:5 L:2) + + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + 0.20,xsd:decimal + accepted + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - - - Harshvardhan J. Pandit - - Human Errors - 2022-08-17 - accepted - 2024-08-16 - Something that acts as or causes Human Errors - - - - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + + + + + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + 2024-02-14 - - + Harshvardhan J. Pandit accepted - 2024-02-14 - - - exploits vulnerability - - - Indicates the threat (subject) exploits the indicated vulnerability (object) + Incident Suspected + - - Identification Control + + - + + + - - 2024-05-19 - Control to identify characteristics of event accepted - - - + 2024-09-30 + Transphobia - + Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + + + + + + + + Risk Concepts - Turtle serialiation + + + + accepted + - accepted - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - 0.43,xsd:decimal + 2024-05-19 + Monitor Risk + Harshvardhan J. Pandit - 2022-08-17 - + Control that monitors a Risk + - - Something that acts as or causes Loss of Opportunity - - 2024-08-16 - Lose of Opportunity - Harshvardhan J. Pandit + + Discrimination against individuals based on physical or mental disabilities + + + + - - 2022-08-17 + 2024-09-30 + Disability Discrimination accepted - + - + + Indicates a concept is relevant to 'Integrity' in CIA InfoSec model + Harshvardhan J. Pandit + 2024-09-29 - accepted - - Misuse - Delaram Golpayegani - Something that acts as or causes Misuse - 2024-06-11 - 2024-08-16 - + accepted + This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact + Integrity Concept + - - Reduce Likelihood - Control that reduces the likelihood of an event + + Control that monitors a Risk Consequence + 2024-05-19 Harshvardhan J. Pandit + - 2024-05-19 - accepted - + Monitor Consequence + - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - ENISA Threat Landscape 2021 + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ENISA Reference Incident Classification Taxonomy 2018 - + + 2024-09-13 + + + + - + ISO/IEC 24027:2021 + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - 2024-05-19 - Incident involving cross-border or multiple jurisdictions + Data Processing Bias accepted - Cross-Border Incident + - - Harshvardhan J. Pandit - 2024-02-14 - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - + + accepted + Incident Identifier + + 2024-05-19 + Identifier associated with an incident - accepted - Incident Concluded - - + + 2024-06-12 + ISO 31073:2022 Risk management vocabulary + + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - Risk Analysis - - Harshvardhan J. Pandit - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - 2022-08-18 + Risk Management accepted - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - Control that reduces the likelihood or severity of an event - 2024-05-19 + + ISO/IEC 24027:2021 + + + + + + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - + 2024-09-13 + accepted + Selection Bias + + + + + + + - Reduction Control + accepted - + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - ISO/IEC 24027:2021 - Simpson'S Paradox Bias - Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - 2024-09-13 + + + + - + + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + 2022-08-17 + 2024-08-16 + + Harshvardhan J. Pandit accepted - Daniel Doherty - - - - - - - Risk Concepts - HTML serialiation - - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + Financial Loss + - + + - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - - Incident Mitigation Measure + Extremely High Risk (RM7x7 S:6 L:6) accepted - 2024-05-19 - + 2022-08-17 + 0.73,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High + + Harshvardhan J. Pandit + - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - 2024-08-16 - 2022-03-30 + + accepted + + + + Control that monitors a Risk Source + Monitor Risk Source Harshvardhan J. Pandit - Something that acts as or causes Material Damage + 2024-05-19 + + + + + - - Material Damage + 2022-08-17 + High Risk (RM3x3 S:3 L:2) + 0.67,xsd:decimal + Harshvardhan J. Pandit accepted - The criteria for what is considered material damage is based in jurisdictional laws and norms - + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + - - accepted - 0.06,xsd:decimal + - + Harshvardhan J. Pandit + Moderate Risk (RM5x5 S:4 L:2) + accepted + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - Extremely Low Risk (RM7x7 S:1 L:3) - Harshvardhan J. Pandit 2022-08-17 - + 0.32,xsd:decimal + - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - https://www.iso.org/standard/72140.html - IEC 31010:2019 - - accepted + + + + + 2024-08-16 + Harshvardhan J. Pandit - - + Harm + accepted + Something that acts as or causes Harm to humans + 2022-08-13 + This concept refers to the general abstract notion of harm + - - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + + - + Assessment of risk involving its identification, analysis, and evaluation + 2024-02-14 + ISO 31073:2022 Risk management vocabulary + accepted - External Security Threat - Concepts associated with security threats that are likely to originate externally - + + Risk Assessment - - Incident Halted + + 2022-08-17 + Harshvardhan J. Pandit + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + - + - accepted - The incident has halted or paused with a high likelihood of resuming or recurring + 0.10,xsd:decimal + + + + Indicates the risk (subject) has the indicated risk source (object) + 2024-02-14 - Harshvardhan J. Pandit - + + + accepted + + + has risk source + + - - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - Something that acts as or causes benefits - 2024-08-16 - 2022-03-23 - Benefit - + + + + + + - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Something that acts as or causes Confidentiality Breach + Confidentiality Breach + 2022-08-17 + 2024-08-16 + Harshvardhan J. Pandit accepted - + + - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - Incident Preliminary Report + + - 2024-05-19 - - accepted + High Risk (RM7x7 S:6 L:3) + 0.37,xsd:decimal + 2022-08-17 + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Landscape for Ransomware Attacks 2022 + + Cross-Border Incident + + 2024-05-19 + + + + accepted + Incident involving cross-border or multiple jurisdictions - + + Low Risk (RM7x7 S:7 L:1) + - + + Harshvardhan J. Pandit + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + 0.14,xsd:decimal + 2022-08-17 + + + + + 2024-02-14 - 0.9,xsd:decimal - 2022-08-18 + + Indicates the threat (subject) exploits the indicated vulnerability (object) accepted - Very High Severity - Harshvardhan J. Pandit - Level where Severity is Very High - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - - + + exploits vulnerability + + + + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ENISA Reference Incident Classification Taxonomy 2018 + 2024-05-19 + accepted + Confidentiality Incident + Incident where the confidentiality of information or system has been affected - Incident where the confidentiality of information or system has been affected - Confidentiality Incident - 2024-05-19 - - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + + 2024-05-19 + - - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - 2022-08-19 - 2024-08-16 - Georg P. Krog - accepted - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + Incident Handling Report + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - Moderate Risk (RM7x7 S:3 L:4) + + accepted - - 0.24,xsd:decimal + + Incident caused due to environmental factors outside human controls + 2024-05-19 - accepted - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - 2022-08-17 - + Environmental Incident - - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - - Intentional Misuse - Intentional Misuse + + Low Risk (RM5x5 S:4 L:1) + - + 2022-08-17 + Harshvardhan J. Pandit + 0.16,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low accepted - + - - The state where an incident was almost successful in taking place i.e. "it came very close" - 2024-02-14 - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + accepted + Control that monitors a Risk Impact + - accepted + Monitor Impact + 2024-05-19 - Incident Near Miss Harshvardhan J. Pandit - + + + + + + Risk Concepts - N3 serialiation + + + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - + + ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Landscape for Ransomware Attacks 2022 + ENISA Threat Landscape for Ransomware Attacks 2022 - - An impact assessment associated with a incident - Incident Impact Assessment - + + Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + Harshvardhan J. Pandit - - 2024-05-19 accepted + 0.71,xsd:decimal + 2022-08-17 + - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ENISA Reference Incident Classification Taxonomy 2018 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - - - 2024-02-14 - - - - Threat Source - Source of threat event, including both agent and non-agent sources - accepted + + Examples for Data Privacy Vocabulary + + + + + - - Low Risk (RM3x3 S:1 L:2) - - - - 0.22,xsd:decimal + + 2022-08-17 Harshvardhan J. Pandit - 2022-08-17 + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High accepted - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - - + - - Control that modifies risk - accepted - - 2024-05-19 - Risk Control - + 0.49,xsd:decimal + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - Environmental Risk - accepted - - - - Risks and issues that have their origin in environment or can affect the environment at large - - - - + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + https://www.iso.org/standard/75281.html - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 - + + - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + 2022-08-17 + Harshvardhan J. Pandit + 0.71,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:5) accepted - Individual Health & Safety - + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + + + + Risk Concepts - HTML serialiation + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - ENISA Reference Incident Classification Taxonomy 2018 + + + + + + + Guides for Data Privacy Vocabulary + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ENISA Reference Incident Classification Taxonomy 2018 - + - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + https://www.iso.org/standard/72140.html + IEC 31010:2019 diff --git a/2.1-dev/risk/risk-owl.ttl b/2.1-dev/risk/risk-owl.ttl index 93c712a51..877d90a81 100644 --- a/2.1-dev/risk/risk-owl.ttl +++ b/2.1-dev/risk/risk-owl.ttl @@ -126,16 +126,36 @@ risk-owl:AccidentalIncident a rdfs:Class, risk-owl:AccidentalMisuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:UserRisks ; + rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; skos:definition "Accidental Misuse"@en ; skos:prefLabel "Accidental Misuse"@en . +risk-owl:AgeDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's age, often impacting older or younger individuals"@en ; + skos:prefLabel "Age Discrimination"@en . + risk-owl:AuthorisationFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -143,21 +163,33 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en . +risk-owl:AvailabilityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Availability' in CIA InfoSec model"@en ; + skos:prefLabel "Availability Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk-owl:AvailabilityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -180,20 +212,26 @@ risk-owl:AvoidSource a rdfs:Class, risk-owl:Benefit a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Compensation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . risk-owl:Bias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -204,7 +242,11 @@ risk-owl:Bias a rdfs:Class, risk-owl:Blackmail a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -212,15 +254,18 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -228,13 +273,24 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . +risk-owl:CasteDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's caste, a form of social stratification found in some cultures"@en ; + skos:prefLabel "Caste Discrimination"@en . + risk-owl:ChangeConsequence a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -259,7 +315,11 @@ risk-owl:ChangeImpact a rdfs:Class, risk-owl:Coercion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -267,16 +327,18 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:CognitiveBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -287,22 +349,28 @@ risk-owl:CognitiveBias a rdfs:Class, risk-owl:Compensation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; skos:prefLabel "Compensation"@en . risk-owl:ComponentFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -310,10 +378,13 @@ risk-owl:ComponentFailure a rdfs:Class, risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -321,7 +392,13 @@ risk-owl:ComponentMalfunction a rdfs:Class, risk-owl:CompromiseAccount a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -329,17 +406,18 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . risk-owl:CompromiseAccountCredentials a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -347,15 +425,18 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -363,12 +444,22 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . +risk-owl:ConfidentialityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model"@en ; + skos:prefLabel "Confidentiality Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk-owl:ConfidentialityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -380,8 +471,11 @@ risk-owl:ConfidentialityIncident a rdfs:Class, risk-owl:ConfirmationBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -392,8 +486,11 @@ risk-owl:ConfirmationBias a rdfs:Class, risk-owl:ConfoundingVariablesBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -425,7 +522,9 @@ risk-owl:ContainmentControl a rdfs:Class, risk-owl:CopyrightViolation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -433,15 +532,18 @@ risk-owl:CopyrightViolation a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . risk-owl:CoverageBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -461,7 +563,10 @@ risk-owl:CrossBorderIncident a rdfs:Class, risk-owl:Cryptojacking a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -469,15 +574,17 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . risk-owl:Damage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -489,8 +596,11 @@ risk-owl:Damage a rdfs:Class, risk-owl:DataAggregationBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -501,8 +611,11 @@ risk-owl:DataAggregationBias a rdfs:Class, risk-owl:DataBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -513,7 +626,13 @@ risk-owl:DataBias a rdfs:Class, risk-owl:DataBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -523,17 +642,18 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . risk-owl:DataCorruption a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -541,8 +661,7 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -550,8 +669,11 @@ risk-owl:DataCorruption a rdfs:Class, risk-owl:DataProcessingBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -571,7 +693,10 @@ risk-owl:DeliberateIncident a rdfs:Class, risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -579,8 +704,7 @@ risk-owl:DenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -597,7 +721,9 @@ risk-owl:DetectionControl a rdfs:Class, risk-owl:Detriment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -607,21 +733,57 @@ risk-owl:Detriment a rdfs:Class, skos:definition "Something that acts as or causes Detriment"@en ; skos:prefLabel "Detriment"@en . +risk-owl:DirectDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)"@en ; + skos:prefLabel "Direct Discrimination"@en . + +risk-owl:DisabilityDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals based on physical or mental disabilities"@en ; + skos:prefLabel "Disability Discrimination"@en . + risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dct:created "2022-08-19"^^xsd:date, + "2024-09-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RiskConcept, + risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Discrimination"@en ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, + "Something that acts as or causes Discrimination"@en ; skos:prefLabel "Discrimination"@en . risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -629,8 +791,7 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:DenialServiceAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -646,7 +807,10 @@ risk-owl:EnvironmentalIncident a rdfs:Class, risk-owl:EnvironmentalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -655,7 +819,11 @@ risk-owl:EnvironmentalRisk a rdfs:Class, risk-owl:EquipmentFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -663,8 +831,7 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -672,7 +839,11 @@ risk-owl:EquipmentFailure a rdfs:Class, risk-owl:EquipmentMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -680,8 +851,7 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -689,7 +859,10 @@ risk-owl:EquipmentMalfunction a rdfs:Class, risk-owl:ErroneousSystemUse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -702,9 +875,38 @@ risk-owl:ErroneousSystemUse a rdfs:Class, skos:definition "Something that acts as or causes Erroneous System Use"@en ; skos:prefLabel "Erroneous System Use"@en . +risk-owl:EthnicDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Racism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals based on their ethnicity or cultural heritage"@en ; + skos:prefLabel "Ethnic Discrimination"@en . + +risk-owl:ExcellenceDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Favoritism towards individuals deemed more competent or superior, often at the expense of others"@en ; + skos:prefLabel "Excellence Discrimination"@en . + risk-owl:ExposureToHarmfulSpeech a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -720,7 +922,8 @@ risk-owl:ExposureToHarmfulSpeech a rdfs:Class, risk-owl:ExternalSecurityThreat a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -729,7 +932,11 @@ risk-owl:ExternalSecurityThreat a rdfs:Class, risk-owl:Extorsion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -737,8 +944,7 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -821,22 +1027,12 @@ risk-owl:ExtremelyLowSeverity a rdfs:Class, skos:prefLabel "Extremely Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1"@en . -risk-owl:Fee a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source "DGA 2.10"@en ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; - sw:term_status "modified"@en ; - skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; - skos:prefLabel "Fee"@en . - risk-owl:FinancialImpact a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -845,7 +1041,10 @@ risk-owl:FinancialImpact a rdfs:Class, risk-owl:FinancialLoss a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -860,7 +1059,11 @@ risk-owl:FinancialLoss a rdfs:Class, risk-owl:Fraud a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -868,16 +1071,44 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . +risk-owl:GenderDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's gender identity or gender expression"@en ; + skos:prefLabel "Gender Discrimination"@en . + +risk-owl:GeographicDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's geographical origin or residence"@en ; + skos:prefLabel "Geographic Discrimination"@en . + risk-owl:GroupAttributionBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -897,9 +1128,23 @@ risk-owl:HaltSource a rdfs:Class, skos:definition "Control that halts the risk source or prevents it from materialising"@en ; skos:prefLabel "Halt Source"@en . +risk-owl:Harassment a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Harm ; + sw:term_status "accepted"@en ; + skos:prefLabel "Harassment"@en . + risk-owl:Harm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -955,9 +1200,25 @@ risk-owl:HighSeverity a rdfs:Class, skos:prefLabel "High Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1"@en . +risk-owl:Homophobia a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SexualOrientationDiscrimination ; + sw:term_status "accepted"@en ; + skos:definition "Hostility or prejudice against individuals who are or are perceived to be homosexual"@en ; + skos:prefLabel "Homophobia"@en . + risk-owl:HumanErrors a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -982,7 +1243,11 @@ risk-owl:IdentificationControl a rdfs:Class, risk-owl:IdentityFraud a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -990,15 +1255,18 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1006,15 +1274,16 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1041,8 +1310,11 @@ risk-owl:ImpactControl a rdfs:Class, risk-owl:ImplicitBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1053,8 +1325,11 @@ risk-owl:ImplicitBias a rdfs:Class, risk-owl:InGroupBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1297,16 +1572,35 @@ risk-owl:IncidentTerminated a rdfs:Class, skos:definition "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring"@en ; skos:prefLabel "Incident Terminated"@en . +risk-owl:IndirectDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified"@en ; + skos:prefLabel "Indirect Discrimination"@en . + risk-owl:IndividualHealthSafety a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; skos:prefLabel "Individual Health & Safety"@en . risk-owl:IndividualRisk a rdfs:Class, - owl:Class ; + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; @@ -1314,8 +1608,11 @@ risk-owl:IndividualRisk a rdfs:Class, risk-owl:InformativenessBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1326,7 +1623,10 @@ risk-owl:InformativenessBias a rdfs:Class, risk-owl:Injury a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1334,19 +1634,33 @@ risk-owl:Injury a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Injury"@en ; skos:prefLabel "Injury"@en . risk-owl:IntegrityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en . +risk-owl:IntegrityConcept a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model"@en ; + skos:prefLabel "Integrity Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk-owl:IntegrityIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -1358,16 +1672,23 @@ risk-owl:IntegrityIncident a rdfs:Class, risk-owl:IntentionalMisuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:UserRisks ; + rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; skos:definition "Intentional Misuse"@en ; skos:prefLabel "Intentional Misuse"@en . risk-owl:InterceptCommunications a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1375,8 +1696,7 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; @@ -1384,25 +1704,46 @@ risk-owl:InterceptCommunications a rdfs:Class, risk-owl:JudicialCosts a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:FinancialLoss ; sw:term_status "accepted"@en ; skos:definition "Something that involves or causes judicial costs to be paid"@en ; skos:prefLabel "Judicial Costs"@en . risk-owl:JudicialPenalty a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:FinancialLoss ; sw:term_status "accepted"@en ; skos:definition "Something that involves or causes judicial penalties to be paid"@en ; skos:prefLabel "Judicial Penalty"@en . +risk-owl:LanguageDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; + skos:prefLabel "Language Discrimination"@en . + risk-owl:LegalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -1411,7 +1752,10 @@ risk-owl:LegalRisk a rdfs:Class, risk-owl:LoseCredibility a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1426,7 +1770,10 @@ risk-owl:LoseCredibility a rdfs:Class, risk-owl:LoseCustomerConfidence a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1441,7 +1788,10 @@ risk-owl:LoseCustomerConfidence a rdfs:Class, risk-owl:LoseGoodwill a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1456,7 +1806,10 @@ risk-owl:LoseGoodwill a rdfs:Class, risk-owl:LoseNegotiatingCapacity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1471,7 +1824,10 @@ risk-owl:LoseNegotiatingCapacity a rdfs:Class, risk-owl:LoseOpportunity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1486,7 +1842,10 @@ risk-owl:LoseOpportunity a rdfs:Class, risk-owl:LoseReputation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1501,7 +1860,10 @@ risk-owl:LoseReputation a rdfs:Class, risk-owl:LoseTrust a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1559,9 +1921,26 @@ risk-owl:LowSeverity a rdfs:Class, skos:prefLabel "Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1"@en . +risk-owl:MaliciousActivity a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + sw:term_status "accepted"@en ; + skos:definition "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others"@en ; + skos:prefLabel "Malicious Activity"@en . + risk-owl:MaliciousCodeAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1569,17 +1948,19 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1587,17 +1968,17 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1608,9 +1989,38 @@ risk-owl:MaterialDamage a rdfs:Class, skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk-owl:Misandry a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Dislike, contempt, or prejudice against men"@en ; + skos:prefLabel "Misandry"@en . + +risk-owl:Misogyny a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Dislike, contempt, or prejudice against women"@en ; + skos:prefLabel "Misogyny"@en . + risk-owl:Misuse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1743,9 +2153,25 @@ risk-owl:MonitorVulnerabilities a rdfs:Class, skos:definition "Control that monitors a Risk Vulnerability"@en ; skos:prefLabel "Monitor Vulnerabilities"@en . +risk-owl:NationalityDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's nationality or citizenship"@en ; + skos:prefLabel "Nationality Discrimination"@en . + risk-owl:NonMaterialDamage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1758,8 +2184,11 @@ risk-owl:NonMaterialDamage a rdfs:Class, risk-owl:NonNormalityBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1770,8 +2199,11 @@ risk-owl:NonNormalityBias a rdfs:Class, risk-owl:NonResponseBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1782,7 +2214,9 @@ risk-owl:NonResponseBias a rdfs:Class, risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -1791,8 +2225,11 @@ risk-owl:OperationalSecurityRisk a rdfs:Class, risk-owl:OutGroupHomogeneityBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -1803,19 +2240,25 @@ risk-owl:OutGroupHomogeneityBias a rdfs:Class, risk-owl:Payment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; skos:prefLabel "Payment"@en . risk-owl:PersonalSafetyEndangerment a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1830,7 +2273,11 @@ risk-owl:PersonalSafetyEndangerment a rdfs:Class, risk-owl:PhishingScam a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1838,15 +2285,17 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1854,22 +2303,72 @@ risk-owl:PhysicalAssault a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . risk-owl:PhysicalHarm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:prefLabel "Physical Harm"@en . +risk-owl:PotentialConsequence a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'consequence concept within an use-case"@en ; + skos:prefLabel "Potential Consequence"@en ; + skos:scopeNote "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialImpact a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'impact' concept within an use-case"@en ; + skos:prefLabel "Potential Impact"@en ; + skos:scopeNote "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialRisk a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'risk' concept within an use-case"@en ; + skos:prefLabel "Potential Risk"@en ; + skos:scopeNote "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk-owl:PotentialRiskSource a rdfs:Class, + owl:Class ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Indicates a concept can potentially be a 'risk source' concept within an use-case"@en ; + skos:prefLabel "Potential RiskSource"@en ; + skos:scopeNote "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + risk-owl:Privacy a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; @@ -1877,7 +2376,10 @@ risk-owl:Privacy a rdfs:Class, risk-owl:PsychologicalHarm a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1885,14 +2387,16 @@ risk-owl:PsychologicalHarm a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2901,6 +3405,32 @@ risk-owl:RM7x7S7L7 a rdfs:Class, skos:definition "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High"@en ; skos:prefLabel "Extremely High Risk (RM7x7 S:7 L:7)"@en . +risk-owl:RacialDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Racism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against individuals because of their racial background or skin color"@en ; + skos:prefLabel "Racial Discrimination"@en . + +risk-owl:Racism a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Prejudice or discrimination against people based on their race"@en ; + skos:prefLabel "Racism"@en . + risk-owl:RecoveryControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -2945,18 +3475,34 @@ risk-owl:ReductionControl a rdfs:Class, risk-owl:Reidentification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . +risk-owl:ReligiousDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's religious beliefs or practices"@en ; + skos:prefLabel "Religious Discrimination"@en . + risk-owl:RemedyControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -3002,7 +3548,10 @@ risk-owl:RemoveSource a rdfs:Class, risk-owl:Renumeration a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3014,7 +3563,10 @@ risk-owl:Renumeration a rdfs:Class, risk-owl:ReputationalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -3023,8 +3575,11 @@ risk-owl:ReputationalRisk a rdfs:Class, risk-owl:RequirementsBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3034,34 +3589,95 @@ risk-owl:RequirementsBias a rdfs:Class, skos:prefLabel "Requirements Bias"@en ; skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . +risk-owl:ReverseDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality"@en ; + skos:prefLabel "Reverse Discrimination"@en . + risk-owl:Reward a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:FinancialImpact ; + rdfs:subClassOf risk-owl:Renumeration ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:prefLabel "Reward"@en . +risk-owl:RightEroded a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:prefLabel "Erosion of Rights"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightObstructed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:prefLabel "Obstruction of Rights"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightsDenial a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:prefLabel "Denial of Rights"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk-owl:RightsExercisePrevention a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; + skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; skos:prefLabel "Prevent Exercising of Rights"@en ; - skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsImpact a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3069,38 +3685,56 @@ risk-owl:RightsImpact a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:Impact, - risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Impact to Rights"@en ; skos:prefLabel "Impact to Rights"@en ; - skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsLimitation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Limitation of Rights"@en ; + skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; skos:prefLabel "Limitation of Rights"@en ; - skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk-owl:RightsUnfulfilled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Failure to meet or complete the fulfilment of rights"@en ; + skos:prefLabel "Unfulfilment of Rights"@en ; + skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsViolation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Violation of Rights"@en ; + skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; skos:prefLabel "Violation of Rights"@en ; - skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RiskAnalysis a rdfs:Class, owl:Class ; @@ -3204,8 +3838,11 @@ risk-owl:RiskSource a rdfs:Class, risk-owl:RuleBasedSystemDesign a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3217,7 +3854,12 @@ risk-owl:RuleBasedSystemDesign a rdfs:Class, risk-owl:Sabotage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3225,17 +3867,18 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:SamplingBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3246,7 +3889,11 @@ risk-owl:SamplingBias a rdfs:Class, risk-owl:Scam a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3254,27 +3901,34 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . risk-owl:SecurityAttack a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . risk-owl:SecurityBreach a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3282,18 +3936,18 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . risk-owl:SelectionBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3302,9 +3956,62 @@ risk-owl:SelectionBias a rdfs:Class, skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; skos:prefLabel "Selection Bias"@en . +risk-owl:SexDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's biological sex"@en ; + skos:prefLabel "Sex Discrimination"@en . + +risk-owl:Sexism a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping"@en ; + skos:prefLabel "Sexism"@en . + +risk-owl:SexualHarassment a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Harm ; + sw:term_status "accepted"@en ; + skos:prefLabel "Sexual Harassment"@en . + +risk-owl:SexualOrientationDiscrimination a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Discrimination ; + sw:term_status "accepted"@en ; + skos:definition "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual"@en ; + skos:prefLabel "SexualOrientation Discrimination"@en . + risk-owl:SexualViolence a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3312,7 +4019,7 @@ risk-owl:SexualViolence a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . @@ -3330,8 +4037,11 @@ risk-owl:ShareRisk a rdfs:Class, risk-owl:SimpsonsParadoxBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3342,7 +4052,10 @@ risk-owl:SimpsonsParadoxBias a rdfs:Class, risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3354,8 +4067,11 @@ risk-owl:SocialDisadvantage a rdfs:Class, risk-owl:SocietalBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3366,7 +4082,10 @@ risk-owl:SocietalBias a rdfs:Class, risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SocietalRisk ; sw:term_status "accepted"@en ; @@ -3374,7 +4093,10 @@ risk-owl:SocietalHealthSafety a rdfs:Class, risk-owl:SocietalRisk a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -3394,29 +4116,31 @@ risk-owl:SourceControl a rdfs:Class, risk-owl:Spoofing a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:prefLabel "Spoofing"@en . risk-owl:StatisticalBias a rdfs:Class, owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource, risk-owl:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO 20501:2019"@en ; rdfs:isDefinedBy risk-owl: ; @@ -3427,7 +4151,11 @@ risk-owl:StatisticalBias a rdfs:Class, risk-owl:SystemFailure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3435,8 +4163,7 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -3444,7 +4171,12 @@ risk-owl:SystemFailure a rdfs:Class, risk-owl:SystemIntrusion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3452,17 +4184,18 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3470,8 +4203,7 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -3479,7 +4211,10 @@ risk-owl:SystemMalfunction a rdfs:Class, risk-owl:Terrorism a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3510,9 +4245,28 @@ risk-owl:ThreatSource a rdfs:Class, skos:definition "Source of threat event, including both agent and non-agent sources"@en ; skos:prefLabel "Threat Source"@en . +risk-owl:Transphobia a rdfs:Class, + owl:Class, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Sexism ; + sw:term_status "accepted"@en ; + skos:definition "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms"@en ; + skos:prefLabel "Transphobia"@en . + risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3520,29 +4274,34 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3550,16 +4309,18 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3567,15 +4328,18 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3583,15 +4347,18 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3599,15 +4366,18 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3615,15 +4385,18 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3631,15 +4404,18 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3647,28 +4423,34 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3676,15 +4458,19 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3692,16 +4478,18 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3709,15 +4497,19 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . risk-owl:UnwantedCodeDeletion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3725,16 +4517,19 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:AvailabilityConcept, + risk-owl:IntegrityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3742,16 +4537,18 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:AvailabilityConcept, - risk-owl:ExternalSecurityThreat, - risk-owl:IntegrityConcept ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:ConfidentialityConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3759,15 +4556,16 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ConfidentialityConcept, - risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk-owl:UserRisks a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; @@ -3860,7 +4658,9 @@ risk-owl:VeryLowSeverity a rdfs:Class, risk-owl:ViolatingCodeOfConduct a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3868,7 +4668,7 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; skos:prefLabel "Violating Code of Conduct"@en ; @@ -3876,7 +4676,9 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, risk-owl:ViolatingContractualObligation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3884,7 +4686,7 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; skos:prefLabel "Violation of Contractual Obligation"@en ; @@ -3892,7 +4694,9 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, risk-owl:ViolatingEthicsCode a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3900,7 +4704,7 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; skos:prefLabel "Violating Ethics Code"@en ; @@ -3908,7 +4712,9 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, risk-owl:ViolatingLegalObligation a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3916,7 +4722,7 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; skos:prefLabel "Violation of Legal Obligations"@en ; @@ -3924,16 +4730,20 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; skos:prefLabel "Violating Policy"@en . risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3941,7 +4751,7 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; skos:prefLabel "Violation of Statutory Obligations"@en ; @@ -3949,7 +4759,10 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, risk-owl:ViolenceAgainstChildren a rdfs:Class, owl:Class, - dpv-owl:RiskConcept ; + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3957,7 +4770,7 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:IndividualRisk ; + rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Child Violence"@en ; skos:prefLabel "Violence against children"@en ; diff --git a/2.1-dev/risk/risk.csv b/2.1-dev/risk/risk.csv index 8f70e883f..93d4bc508 100644 --- a/2.1-dev/risk/risk.csv +++ b/2.1-dev/risk/risk.csv @@ -9,77 +9,88 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,m 7RiskLevels,class,https://w3id.org/dpv/risk#7RiskLevels,7 Risk Levels,Scale with 7 Risk Levels from Extremely High to Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk 7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk +AgeDiscrimination,class,https://w3id.org/dpv/risk#AgeDiscrimination,Age Discrimination,"Discrimination based on a person's age, often impacting older or younger individuals",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AvailabilityConcept,class,https://w3id.org/dpv/risk#AvailabilityConcept,Availability Concept,Indicates a concept is relevant to 'Availability' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#RiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Compensation,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#RiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CasteDiscrimination,class,https://w3id.org/dpv/risk#CasteDiscrimination,Caste Discrimination,"Discrimination based on a person's caste, a form of social stratification found in some cultures",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityConcept,class,https://w3id.org/dpv/risk#ConfidentialityConcept,Confidentiality Concept,Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#SecurityBreach;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#IntegrityConcept,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +DirectDiscrimination,class,https://w3id.org/dpv/risk#DirectDiscrimination,Direct Discrimination,"Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +DisabilityDiscrimination,class,https://w3id.org/dpv/risk#DisabilityDiscrimination,Disability Discrimination,Discrimination against individuals based on physical or mental disabilities,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DenialServiceAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EthnicDiscrimination,class,https://w3id.org/dpv/risk#EthnicDiscrimination,Ethnic Discrimination,Discrimination against individuals based on their ethnicity or cultural heritage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk +ExcellenceDiscrimination,class,https://w3id.org/dpv/risk#ExcellenceDiscrimination,Excellence Discrimination,"Favoritism towards individuals deemed more competent or superior, often at the expense of others",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyLowLikelihood,class,https://w3id.org/dpv/risk#ExtremelyLowLikelihood,Extremely Low Likelihood,Level where Likelihood is Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyLowRisk,class,https://w3id.org/dpv/risk#ExtremelyLowRisk,Extremely Low Risk,Level where Risk is Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extremely Low Severity,Level where Severity is Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +GenderDiscrimination,class,https://w3id.org/dpv/risk#GenderDiscrimination,Gender Discrimination,Discrimination based on a person's gender identity or gender expression,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +GeographicDiscrimination,class,https://w3id.org/dpv/risk#GeographicDiscrimination,Geographic Discrimination,Discrimination based on a person's geographical origin or residence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk -HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Harassment,class,https://w3id.org/dpv/risk#Harassment,Harassment,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk +HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +Homophobia,class,https://w3id.org/dpv/risk#Homophobia,Homophobia,Hostility or prejudice against individuals who are or are perceived to be homosexual,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,Incident is realised or materialised risk,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk IncidentAssessmentReport,class,https://w3id.org/dpv/risk#IncidentAssessmentReport,Incident Assessment Report,A report describing the assessment of an incident in terms of its effects or impacts,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk IncidentConcluded,class,https://w3id.org/dpv/risk#IncidentConcluded,Incident Concluded,The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk @@ -103,33 +114,39 @@ IncidentStatusUnknown,class,https://w3id.org/dpv/risk#IncidentStatusUnknown,Inci IncidentSuspected,class,https://w3id.org/dpv/risk#IncidentSuspected,Incident Suspected,"The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk IncidentSuspectedReport,class,https://w3id.org/dpv/risk#IncidentSuspectedReport,Incident Suspected Report,A report describing the suspicion of an incident in the past or occuring,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk IncidentTerminated,class,https://w3id.org/dpv/risk#IncidentTerminated,Incident Terminated,The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,risk,https://w3id.org/dpv/risk -InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IndirectDiscrimination,class,https://w3id.org/dpv/risk#IndirectDiscrimination,Indirect Discrimination,"Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,,,,,risk,https://w3id.org/dpv/risk +InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IntegrityConcept,class,https://w3id.org/dpv/risk#IntegrityConcept,Integrity Concept,Indicates a concept is relevant to 'Integrity' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk -JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk -LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk -ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk +JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk +LanguageDiscrimination,class,https://w3id.org/dpv/risk#LanguageDiscrimination,Language Discrimination,"Discrimination based on a person's language, often linked to national origin or ethnicity",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +MaliciousActivity,class,https://w3id.org/dpv/risk#MaliciousActivity,Malicious Activity,"Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +Misandry,class,https://w3id.org/dpv/risk#Misandry,Misandry,"Dislike, contempt, or prejudice against men",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Misogyny,class,https://w3id.org/dpv/risk#Misogyny,Misogyny,"Dislike, contempt, or prejudice against women",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk +ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk MonitorImpact,class,https://w3id.org/dpv/risk#MonitorImpact,Monitor Impact,Control that monitors a Risk Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk @@ -137,19 +154,24 @@ MonitorRisk,class,https://w3id.org/dpv/risk#MonitorRisk,Monitor Risk,Control tha MonitorRiskControl,class,https://w3id.org/dpv/risk#MonitorRiskControl,Monitor Control,Control that monitors another Control,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorRiskSource,class,https://w3id.org/dpv/risk#MonitorRiskSource,Monitor Risk Source,Control that monitors a Risk Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorVulnerabilities,class,https://w3id.org/dpv/risk#MonitorVulnerabilities,Monitor Vulnerabilities,Control that monitors a Risk Vulnerability,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +NationalityDiscrimination,class,https://w3id.org/dpv/risk#NationalityDiscrimination,Nationality Discrimination,Discrimination based on a person's nationality or citizenship,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +PotentialConsequence,class,https://w3id.org/dpv/risk#PotentialConsequence,Potential Consequence,Indicates a concept can potentially be a 'consequence concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk +PotentialImpact,class,https://w3id.org/dpv/risk#PotentialImpact,Potential Impact,Indicates a concept can potentially be a 'impact' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk +PotentialRisk,class,https://w3id.org/dpv/risk#PotentialRisk,Potential Risk,Indicates a concept can potentially be a 'risk' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk +PotentialRiskSource,class,https://w3id.org/dpv/risk#PotentialRiskSource,Potential RiskSource,Indicates a concept can potentially be a 'risk source' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk +Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk RM3x3S1L1,class,https://w3id.org/dpv/risk#RM3x3S1L1,Low Risk (RM3x3 S:1 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk RM3x3S1L2,class,https://w3id.org/dpv/risk#RM3x3S1L2,Low Risk (RM3x3 S:1 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk RM3x3S1L3,class,https://w3id.org/dpv/risk#RM3x3S1L3,Moderate Risk (RM3x3 S:1 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk @@ -233,23 +255,31 @@ RM7x7S7L4,class,https://w3id.org/dpv/risk#RM7x7S7L4,Very High Risk (RM7x7 S:7 L: RM7x7S7L5,class,https://w3id.org/dpv/risk#RM7x7S7L5,Extremely High Risk (RM7x7 S:7 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk RM7x7S7L6,class,https://w3id.org/dpv/risk#RM7x7S7L6,Extremely High Risk (RM7x7 S:7 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk RM7x7S7L7,class,https://w3id.org/dpv/risk#RM7x7S7L7,Extremely High Risk (RM7x7 S:7 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk +RacialDiscrimination,class,https://w3id.org/dpv/risk#RacialDiscrimination,Racial Discrimination,Discrimination against individuals because of their racial background or skin color,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Racism,class,https://w3id.org/dpv/risk#Racism,Racism,Prejudice or discrimination against people based on their race,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control,Control to recover from event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +ReligiousDiscrimination,class,https://w3id.org/dpv/risk#ReligiousDiscrimination,Religious Discrimination,Discrimination based on a person's religious beliefs or practices,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveSource,class,https://w3id.org/dpv/risk#RemoveSource,Remove Source,Control that removes the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk -Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#Impact;https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""LimitationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ViolationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk +ReverseDiscrimination,class,https://w3id.org/dpv/risk#ReverseDiscrimination,Reverse Discrimination,"Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +RightEroded,class,https://w3id.org/dpv/risk#RightEroded,Erosion of Rights,The gradual weakening or reduction of the scope and protection of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightObstructed,class,https://w3id.org/dpv/risk#RightObstructed,Obstruction of Rights,Interference with or blocking of the exercise of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsDenial,class,https://w3id.org/dpv/risk#RightsDenial,Denial of Rights,The refusal or withholding or denial of the existence or applicability of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Actions or measures that prevent an individual or group from exercising their legal rights.,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,A limitation or restrictions on the scope or exercise of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""LimitationOfRights"" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsUnfulfilled,class,https://w3id.org/dpv/risk#RightsUnfulfilled,Unfulfilment of Rights,Failure to meet or complete the fulfilment of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,The infringement or breach of rights in a manner that constitues a 'violation' of those rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""ViolationOfRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk RiskAnalysis,class,https://w3id.org/dpv/risk#RiskAnalysis,Risk Analysis,"A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures",,https://w3id.org/dpv/risk#RiskAssessment,https://w3id.org/dpv/risk#RiskAssessment,,2022-08-18,,risk,https://w3id.org/dpv/risk RiskAssessment,class,https://w3id.org/dpv/risk#RiskAssessment,Risk Assessment,"Assessment of risk involving its identification, analysis, and evaluation",,https://w3id.org/dpv/risk#RiskManagement,https://w3id.org/dpv/risk#RiskManagement,,2024-02-14,,risk,https://w3id.org/dpv/risk RiskControl,class,https://w3id.org/dpv/risk#RiskControl,Risk Control,Control that modifies risk,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk @@ -259,59 +289,64 @@ RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A R RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk -RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SexDiscrimination,class,https://w3id.org/dpv/risk#SexDiscrimination,Sex Discrimination,Discrimination based on a person's biological sex,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Sexism,class,https://w3id.org/dpv/risk#Sexism,Sexism,"Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +SexualHarassment,class,https://w3id.org/dpv/risk#SexualHarassment,Sexual Harassment,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +SexualOrientationDiscrimination,class,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,SexualOrientation Discrimination,"Discrimination based on a person's sexual orientation, typically against those who are not heterosexual",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk -SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk +SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +Transphobia,class,https://w3id.org/dpv/risk#Transphobia,Transphobia,Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,,,risk,https://w3id.org/dpv/risk -ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,,,,risk,https://w3id.org/dpv/risk +ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Vulnerability,class,https://w3id.org/dpv/risk#Vulnerability,Vulnerability,Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk causedByThreat,property,https://w3id.org/dpv/risk#causedByThreat,caused by threat,Indicates the cause of associated context (subject) was the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk causedByVulnerability,property,https://w3id.org/dpv/risk#causedByVulnerability,caused by vulnerability,Indicates the associated context (subject) is caused by the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/risk.html b/2.1-dev/risk/risk.html index 239452705..1ff9e1027 100644 --- a/2.1-dev/risk/risk.html +++ b/2.1-dev/risk/risk.html @@ -1,3 +1,5 @@ + + @@ -379,6 +381,35 @@ +
    @@ -452,10 +483,45 @@

    Core Concepts

  • [=RiskMatrix=] to represent the popular risk analysis method for calculating risk levels based on likelihood and severity.
    • +
    • + risk:AvailabilityConcept: Indicates a concept is relevant to 'Availability' in CIA InfoSec model + go to full definition + +
    • +
    • + risk:ConfidentialityConcept: Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + go to full definition + +
    • risk:Incident: An actual or occured event go to full definition +
    • +
    • + risk:IntegrityConcept: Indicates a concept is relevant to 'Integrity' in CIA InfoSec model + go to full definition + +
    • +
    • + risk:PotentialConsequence: Indicates a concept can potentially be a 'consequence concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialImpact: Indicates a concept can potentially be a 'impact' concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialRisk: Indicates a concept can potentially be a 'risk' concept within an use-case + go to full definition + +
    • +
    • + risk:PotentialRiskSource: Indicates a concept can potentially be a 'risk source' concept within an use-case + go to full definition +
    • risk:RiskManagement: Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk @@ -1246,8 +1312,8 @@

      Controls

    -
    -

    Consequences and Impacts

    +
    +

    Taxonomies

    @@ -1271,78 +1337,147 @@

    Consequences and Impacts

    dpv:hasImpact risk:RightsImpact . -

    The concepts taxonomy is broadly divided into the following categories:

    - - -
    -

    CIA Model

    -

    Confidentiality

    +
    +

    Potential Risk Sources

    • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:Coercion: Something that acts as or causes Coercion - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
        • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
        • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition
        • - risk:AvailabilityBreach: None - go to full definition + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
        • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition
        • - risk:IntegrityBreach: None - go to full definition + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ExternalSecurityThreat: Concepts associated with security threats that are likely to originate externally + go to full definition +
        +
      • + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition + +
      • +
      • + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition + +
      • +
      • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition +
          +
        • + risk:Blackmail: Something that acts as or causes Blackmail + go to full definition + +
        • +
        • + risk:Coercion: Something that acts as or causes Coercion + go to full definition + +
        • risk:Extorsion: Something that acts as or causes Extorsion go to full definition @@ -1367,16 +1502,6 @@

          Confidentiality

          risk:InterceptCommunications: Something that acts as or causes Interception of Communications go to full definition -
        • -
        • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition - -
        • -
        • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition -
        • risk:PhishingScam: Something that acts as or causes Phishing Scam @@ -1384,8 +1509,8 @@

          Confidentiality

        • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition
        • @@ -1394,40 +1519,45 @@

          Confidentiality

        • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:Spoofing: Something that acts as or causes Spoofing + go to full definition
        • +
        +
      • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition -
      • risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity go to full definition +
          +
        • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition
        • @@ -1454,6 +1585,11 @@

          Confidentiality

          risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition +
        • +
        • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition +
        • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1464,6 +1600,11 @@

          Confidentiality

          risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition +
        • +
        • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition +
        • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1474,6 +1615,11 @@

          Confidentiality

          risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification go to full definition +
        • +
        • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition +
        • risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access @@ -1481,78 +1627,71 @@

          Confidentiality

        • - risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data - go to full definition + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition
        • -
    - -

    Integrity

    -
    • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition
    • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition
    • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition
    • +
    + + +
  • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
  • +
  • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition -
  • risk:DataCorruption: Something that acts as or causes Corruption of Data go to full definition
  • - risk:IntegrityBreach: None - go to full definition - -
  • -
  • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition - -
  • -
  • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition + risk:EquipmentFailure: Something that acts as or causes Equipment Failure + go to full definition
  • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + go to full definition
  • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
  • @@ -1583,171 +1722,228 @@

    Integrity

  • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
  • - risk:SystemIntrusion: Something that acts as or causes System Intrusion - go to full definition + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition
  • + +
  • - risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises - go to full definition + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition + +
  • +
    +
    + +
    +

    Potential Risks

    +
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • -
    - -

    Availability

    -
    • - risk:AvailabilityBreach: None - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
    • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
    • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition
    • +
    +
  • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
      +
    • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
    • - risk:Cryptojacking: Something that acts as or causes Cryptojacking - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition
    • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
    • +
    • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition
      • - risk:AvailabilityBreach: None - go to full definition + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition
      • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach - go to full definition + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition
      • - risk:IntegrityBreach: None - go to full definition + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
          +
        • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition
        • -
        -
      • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) - go to full definition + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition
      • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) - go to full definition + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
      • +
      +
    • +
    +
  • + + + +
  • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure - go to full definition + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition
  • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction - go to full definition + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition
  • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack - go to full definition + risk:CopyrightViolation: Something that acts as or causes Copyright Violation + go to full definition
  • - risk:MalwareAttack: Something that acts as or causes Malware Attack - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
  • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
      +
    • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
        +
      • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
      • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
      • +
      +
    • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition @@ -1755,87 +1951,76 @@

      Availability

  • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition +
  • -
    - -
    -

    User

    -
  • - risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use - go to full definition + risk:IndividualHealthSafety: None + go to full definition
  • - risk:HumanErrors: Something that acts as or causes Human Errors - go to full definition + risk:Privacy: None + go to full definition
  • -
  • - risk:IntentionalMisuse: Intentional Misuse - go to full definition - +
  • - risk:Misuse: Something that acts as or causes Misuse - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
  • -
    -
    - -
    -

    Legal

    -
    • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition - -
    • + risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement + go to full definition + +
    • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition +
        +
      • + risk:Blackmail: Something that acts as or causes Blackmail + go to full definition
      • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:Coercion: Something that acts as or causes Coercion + go to full definition
      • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:Extorsion: Something that acts as or causes Extorsion + go to full definition
      • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition + risk:Fraud: Something that acts as or causes Fraud + go to full definition
      • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition
      • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition
      • -
    -
    - -
    -

    Reputational

    -
    +
  • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition +
  • -
    - -
    -

    Societal

    -
    -
    - -
    -

    Individual

    -
      +
    +
  • - risk:Harm: Something that acts as or causes Harm to humans - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
  • - risk:SexualViolence: Something that acts as or causes Sexual Violence - go to full definition + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition +
      +
    • + risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + go to full definition
    • - risk:ViolenceAgainstChildren: Something that acts as or causes Child Violence - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
    • -
  • -
    - -
    -

    Environmental

    -
    -
    - -
    -

    Financial

    -
    • - risk:Benefit: Something that acts as or causes benefits - go to full definition + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition +
        +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • +
      +
    • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
    • - risk:Fee: Something that acts as or provides fees e.g. for using a service - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
    • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • +
    +
  • - risk:JudicialCosts: Something that involves or causes judicial costs to be paid - go to full definition + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
      +
    • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition
      • - risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid - go to full definition + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition
      • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition
      • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition
      • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition
      • -
  • -
    - -
    -

    Bias

    -

    Note: These are intended to represent bias concepts in general e.g. applicable for any technology. The AI extension contains an additional set of concepts that extend these concepts to represent biases that are specific to the development and use of AI.

    -
    • - risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information - go to full definition -
        + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • - risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - go to full definition + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition
      • - risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - go to full definition + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition
      • - risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories - go to full definition + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition
      • - risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics - go to full definition + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition
        • - risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - go to full definition + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition
        • +
        +
      • - risk:RequirementsBias: Bias that occurs in or during requirements creation - go to full definition + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition
      • - risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - go to full definition + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition
      • - risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - go to full definition + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition
      • - risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - go to full definition + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition
        • - risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - go to full definition + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition
        • +
        +
      • +
      +
    • - risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - go to full definition + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition
    • - risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - go to full definition + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition
    • - risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - go to full definition + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition
      • - risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - go to full definition + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition
      • - risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - go to full definition + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition
      • - risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - go to full definition + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
    • +
    • + risk:SocietalHealthSafety: None + go to full definition + +
    • +
    • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
    • +
    + +
  • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition
    • - risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - go to full definition + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition
    • - risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - go to full definition + risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + go to full definition
    • - risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population - go to full definition + risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition + +
    • +
    • + risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + go to full definition + +
    • +
    • + risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition + +
    • +
    • + risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + go to full definition + +
    • +
    • + risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition
  • +
  • + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition +
  • +
  • + risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct + go to full definition + +
  • +
  • + risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations + go to full definition + +
  • +
  • + risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code + go to full definition + +
  • +
  • + risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations + go to full definition + +
  • +
  • + risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy + go to full definition + +
  • +
  • + risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations + go to full definition + +
  • -
    - - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    -
    -

    Risk Matrix 3x3

    - - - - - - - - - - - - - - - - - - - - - - - - - -
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    +

    Potential Consequences

    +
      +
    • + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
        • +
        • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
        • +
        • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
        • +
        • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
        • +
        • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
        • +
        • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
        • +
        • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
        • +
        • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
        • +
        • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
            • +
            +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ComponentFailure: Something that acts as or causes Component Failure + go to full definition + +
    • +
    • + risk:ComponentMalfunction: Something that acts as or causes Component Malfunction + go to full definition + +
    • +
    • + risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + go to full definition + +
    • +
    • + risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + go to full definition + +
    • +
    • + risk:CopyrightViolation: Something that acts as or causes Copyright Violation + go to full definition + +
    • +
    • + risk:DataCorruption: Something that acts as or causes Corruption of Data + go to full definition + +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:EquipmentFailure: Something that acts as or causes Equipment Failure + go to full definition + +
    • +
    • + risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + go to full definition + +
    • +
    • + risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use + go to full definition + +
    • +
    • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
        +
      • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
          +
        • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition + +
        • +
        • + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition + +
        • +
        +
      • +
      • + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
          +
        • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition + +
        • +
        • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
        • +
        • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:HumanErrors: Something that acts as or causes Human Errors + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
    • +
    • + risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement + go to full definition + +
    • +
    • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition + +
    • +
    • + risk:Misuse: Something that acts as or causes Misuse + go to full definition + +
    • +
    • + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition + +
    • +
    • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition +
        +
      • + risk:LoseCredibility: Something that acts as or causes Loss of Credibility + go to full definition + +
      • +
      • + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition + +
      • +
      • + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition + +
      • +
      • + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition + +
      • +
      • + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition + +
      • +
      • + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition + +
      • +
      • + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition + +
      • +
      +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition + +
    • +
    • + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
        +
      • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
          +
        • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
        • +
        • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
        • +
        • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
        • +
        • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
        • +
        • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
        • +
        • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
        • +
        • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
        • +
        • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
        • +
        • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
        • +
        • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
            +
          • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
          • +
          • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
          • +
          +
        • +
        • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
        • +
        • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
        • +
        • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
            +
          • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
          • +
          • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
          • +
          • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
          • +
          • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
          • +
          • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
          • +
          +
        • +
        • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
            +
          • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
          • +
          +
        • +
        +
      • +
      • + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition + +
      • +
      • + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition + +
      • +
      • + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition +
          +
        • + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
        • +
        • + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
        • +
        • + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
        • +
        • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
        • +
        • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
        • +
        • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
        • +
        • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
        • +
        +
      • +
      • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
      • +
      • + risk:SocietalHealthSafety: None + go to full definition + +
      • +
      • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
      • +
      +
    • +
    • + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition + +
    • +
    • + risk:SystemMalfunction: Something that acts as or causes System Malfunction + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition +
        +
      • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
      • +
      • + risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + go to full definition + +
      • +
      • + risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + go to full definition + +
      • +
      • + risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + go to full definition + +
      • +
      • + risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + go to full definition + +
      • +
      • + risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + go to full definition + +
      • +
      • + risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + go to full definition + +
      • +
      • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
      • +
      • + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
      • +
      • + risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + go to full definition + +
      • +
      • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
      • +
      • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
      • +
      • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
      • +
      +
    • +
    • + risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct + go to full definition + +
    • +
    • + risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations + go to full definition + +
    • +
    • + risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code + go to full definition + +
    • +
    • + risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations + go to full definition + +
    • +
    • + risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy + go to full definition + +
    • +
    • + risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations + go to full definition + +
    • +
    +
    + +
    +

    Potential Impacts

    +
      +
    • + risk:Damage: Something that acts as or causes Damage + go to full definition + +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
        +
      • + risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
          +
        • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition + +
        • +
        • + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition + +
        • +
        +
      • +
      • + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
          +
        • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition + +
        • +
        • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
        • +
        • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:MaterialDamage: Something that acts as or causes Material Damage + go to full definition + +
    • +
    • + risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage + go to full definition + +
    • +
    • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition +
        +
      • + risk:LoseCredibility: Something that acts as or causes Loss of Credibility + go to full definition + +
      • +
      • + risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence + go to full definition + +
      • +
      • + risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill + go to full definition + +
      • +
      • + risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity + go to full definition + +
      • +
      • + risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity + go to full definition + +
      • +
      • + risk:LoseReputation: Something that acts as or causes Loss of Reputation + go to full definition + +
      • +
      • + risk:LoseTrust: Something that acts as or causes Loss of Trust + go to full definition + +
      • +
      +
    • +
    • + risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society + go to full definition +
        +
      • + risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + go to full definition +
          +
        • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
        • +
        • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
        • +
        • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
        • +
        • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
        • +
        • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
        • +
        • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
        • +
        • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
        • +
        • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
        • +
        • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
        • +
        • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
            +
          • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
          • +
          • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
          • +
          +
        • +
        • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
        • +
        • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
        • +
        • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
            +
          • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
          • +
          • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
          • +
          • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
          • +
          • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
          • +
          • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
          • +
          +
        • +
        • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
            +
          • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
          • +
          +
        • +
        +
      • +
      • + risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech + go to full definition + +
      • +
      • + risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment + go to full definition + +
      • +
      • + risk:RightsImpact: Something that acts as or causes Impact to Rights + go to full definition +
          +
        • + risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
        • +
        • + risk:RightObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
        • +
        • + risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
        • +
        • + risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
        • +
        • + risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
        • +
        • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
        • +
        • + risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
        • +
        +
      • +
      • + risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + go to full definition + +
      • +
      • + risk:SocietalHealthSafety: None + go to full definition + +
      • +
      • + risk:Terrorism: Something that acts as or causes Terrorism + go to full definition + +
      • +
      +
    • +
    +
    + +
    +

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentialityIntegrityAvailability
    risk:AccidentalMisuse
    risk:AgeDiscrimination
    risk:AuthorisationFailure
    risk:AvailabilityBreach
    risk:Benefit
    risk:Bias
    risk:Blackmail
    risk:BruteForceAuthorisations
    risk:CasteDiscrimination
    risk:Coercion
    risk:CognitiveBias
    risk:Compensation
    risk:ComponentFailure
    risk:ComponentMalfunction
    risk:CompromiseAccount
    risk:CompromiseAccountCredentials
    risk:ConfidentialityBreach
    risk:ConfirmationBias
    risk:ConfoundingVariablesBias
    risk:CopyrightViolation
    risk:CoverageBias
    risk:Cryptojacking
    risk:Damage
    risk:DataAggregationBias
    risk:DataBias
    risk:DataBreach
    risk:DataCorruption
    risk:DataProcessingBias
    risk:DenialServiceAttack
    risk:Detriment
    risk:DirectDiscrimination
    risk:DisabilityDiscrimination
    risk:Discrimination
    risk:DistributedDenialServiceAttack
    risk:EnvironmentalRisk
    risk:EquipmentFailure
    risk:EquipmentMalfunction
    risk:ErroneousSystemUse
    risk:EthnicDiscrimination
    risk:ExcellenceDiscrimination
    risk:ExposureToHarmfulSpeech
    risk:ExternalSecurityThreat
    risk:Extorsion
    risk:FinancialImpact
    risk:FinancialLoss
    risk:Fraud
    risk:GenderDiscrimination
    risk:GeographicDiscrimination
    risk:GroupAttributionBias
    risk:Harassment
    risk:Harm
    risk:Homophobia
    risk:HumanErrors
    risk:IdentityFraud
    risk:IdentityTheft
    risk:IllegalDataProcessing
    risk:ImplicitBias
    risk:IndirectDiscrimination
    risk:IndividualHealthSafety
    risk:IndividualRisk
    risk:InformativenessBias
    risk:InGroupBias
    risk:Injury
    risk:IntegrityBreach
    risk:IntentionalMisuse
    risk:InterceptCommunications
    risk:JudicialCosts
    risk:JudicialPenalty
    risk:LanguageDiscrimination
    risk:LegalRisk
    risk:LoseCredibility
    risk:LoseCustomerConfidence
    risk:LoseGoodwill
    risk:LoseNegotiatingCapacity
    risk:LoseOpportunity
    risk:LoseReputation
    risk:LoseTrust
    risk:MaliciousActivity
    risk:MaliciousCodeAttack
    risk:MalwareAttack
    risk:MaterialDamage
    risk:Misandry
    risk:Misogyny
    risk:Misuse
    risk:NationalityDiscrimination
    risk:NonMaterialDamage
    risk:NonNormalityBias
    risk:NonResponseBias
    risk:OperationalSecurityRisk
    risk:OutGroupHomogeneityBias
    risk:Payment
    risk:PersonalSafetyEndangerment
    risk:PhishingScam
    risk:PhysicalAssault
    risk:PhysicalHarm
    risk:Privacy
    risk:PsychologicalHarm
    risk:PublicOrderBreach
    risk:RacialDiscrimination
    risk:Racism
    risk:Reidentification
    risk:ReligiousDiscrimination
    risk:Renumeration
    risk:ReputationalRisk
    risk:RequirementsBias
    risk:ReverseDiscrimination
    risk:Reward
    risk:RightEroded
    risk:RightObstructed
    risk:RightsDenial
    risk:RightsExercisePrevention
    risk:RightsImpact
    risk:RightsLimitation
    risk:RightsUnfulfilled
    risk:RightsViolation
    risk:RuleBasedSystemDesign
    risk:Sabotage
    risk:SamplingBias
    risk:Scam
    risk:SecurityAttack
    risk:SecurityBreach
    risk:SelectionBias
    risk:SexDiscrimination
    risk:Sexism
    risk:SexualHarassment
    risk:SexualOrientationDiscrimination
    risk:SexualViolence
    risk:SimpsonsParadoxBias
    risk:SocialDisadvantage
    risk:SocietalBias
    risk:SocietalHealthSafety
    risk:SocietalRisk
    risk:Spoofing
    risk:StatisticalBias
    risk:SystemFailure
    risk:SystemIntrusion
    risk:SystemMalfunction
    risk:Terrorism
    risk:Transphobia
    risk:UnauthorisedAccesstoPremises
    risk:UnauthorisedActivity
    risk:UnauthorisedCodeAccess
    risk:UnauthorisedCodeDisclosure
    risk:UnauthorisedCodeModification
    risk:UnauthorisedDataAccess
    risk:UnauthorisedDataDisclosure
    risk:UnauthorisedDataModification
    risk:UnauthorisedInformationDisclosure
    risk:UnauthorisedReidentification
    risk:UnauthorisedResourceUse
    risk:UnauthorisedSystemAccess
    risk:UnauthorisedSystemModification
    risk:UnwantedCodeDeletion
    risk:UnwantedDataDeletion
    risk:UnwantedDisclosureData
    risk:UserRisks
    risk:ViolatingCodeOfConduct
    risk:ViolatingContractualObligation
    risk:ViolatingEthicsCode
    risk:ViolatingLegalObligation
    risk:ViolatingPolicy
    risk:ViolatingStatutoryObligations
    risk:ViolenceAgainstChildren
    + +
    + +
    +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    + + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    3 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + +
    +

    Accidental Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Accidental Misuse

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalMisusePrefixrisk
    LabelAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse + → risk:UserRisks + → dpv:RiskConcept +
    DefinitionAccidental Misuse
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Age Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAgeDiscriminationPrefixrisk
    LabelAge Discrimination
    IRIhttps://w3id.org/dpv/risk#AgeDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's age, often impacting older or younger individuals
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Authorisation Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    None

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityBreachPrefixrisk
    LabelNone
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Availability Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityConceptPrefixrisk
    LabelAvailability Concept
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Availability Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + +
    +

    Avoid Source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that avoids the risk source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + +
    +

    Benefit

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBenefitPrefixrisk
    LabelBenefit
    IRIhttps://w3id.org/dpv/risk#Benefit
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Compensation + → risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes benefits
    Date Created2022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBiasPrefixrisk
    LabelBias
    IRIhttps://w3id.org/dpv/risk#Bias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskConcept +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    + + + + + + + +
    +

    Blackmail

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBlackmailPrefixrisk
    LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Blackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Brute Force Authorisations

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermBruteForceAuthorisationsPrefixrisk
    LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Caste Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCasteDiscriminationPrefixrisk
    LabelCaste Discrimination
    IRIhttps://w3id.org/dpv/risk#CasteDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's caste, a form of social stratification found in some cultures
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Change Consequence

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + +
    +

    Change Impact

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + + +
    +

    Coercion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Coercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Cognitive Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCognitiveBiasPrefixrisk
    LabelCognitive Bias
    IRIhttps://w3id.org/dpv/risk#CognitiveBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when humans are processing and interpreting information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    + + + + + + +
    +

    Compensation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept +
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Component Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentFailurePrefixrisk
    LabelComponent Failure
    IRIhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Component Failure
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Component Malfunction

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentMalfunctionPrefixrisk
    LabelComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Component Malfunction
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + + + +
    +

    Compromise Account

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiser
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Compromise Account Credentials

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Account Credentials to be compromised
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Confidentiality Breach

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityBreachPrefixrisk
    LabelConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Confidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Confidentiality Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityConceptPrefixrisk
    LabelConfidentiality Concept
    IRIhttps://w3id.org/dpv/risk#ConfidentialityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Confidentiality Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfidentialityIncidentPrefixrisk
    LabelConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Confirmation Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfirmationBiasPrefixrisk
    LabelConfirmation Bias
    IRIhttps://w3id.org/dpv/risk#ConfirmationBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Confounding Variables Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConfoundingVariablesBiasPrefixrisk
    LabelConfounding Variables Bias
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + +
    +

    Consequence Control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermConsequenceControlPrefixrisk
    LabelConsequence Control
    IRIhttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionRisk Mitigation Measure that controls the Consequences
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    + + + +
    +

    Containment Control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermContainmentControlPrefixrisk
    LabelContainment Control
    IRIhttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl to contain event
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK +
    + + + + + +
    +

    Copyright Violation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
    -

    Risk Matrix 5x5

    -
    TermCopyrightViolationPrefixrisk
    LabelCopyright Violation
    IRIhttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ViolatingObligation +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + + + +
    DefinitionSomething that acts as or causes Copyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Very LowLowModerateHighVery HighSee More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + + +
    +

    Coverage Bias

    + + + + + + + - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoverageBiasPrefixrisk
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]LabelCoverage Bias
    IRIhttps://w3id.org/dpv/risk#CoverageBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Cross-Border Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCrossBorderIncidentPrefixrisk
    LabelCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Cryptojacking

    + + - - - - - - + + + + - - - - - - + + - - - - - - - + + + - - - - - - - + + + + + + -
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]TermCryptojackingPrefixrisk
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]LabelCryptojacking
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    IRIhttps://w3id.org/dpv/risk#Cryptojacking
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    -
    + + + Broader/Parent types + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept + + + -
    -

    Risk Matrix 7x7

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    DefinitionSomething that acts as or causes Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Damage

    + + - - - - - - - - + + + + - - - - - - - - + + - - - - - - - - - + + + - - - - - - - - - + + + + + + -
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]TermDamagePrefixrisk
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]LabelDamage
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    IRIhttps://w3id.org/dpv/risk#Damage
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    -
    + + + Broader/Parent types + risk:LegalRisk + → dpv:RiskConcept + + + -
    + + + + + + + Definition + Something that acts as or causes Damage + + + -
    -

    Vocabulary Index

    -
    -

    Classes

    - - + + + + + + + + Date Created + 2022-03-30 + + + Date Modified + 2024-08-16 + + + Contributors + Harshvardhan J. Pandit + + + + See More: + section RISK-TAXONOMY in RISK + + + + +
    +
    +

    Data Aggregation Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataAggregationBiasPrefixrisk
    LabelData Aggregation Bias
    IRIhttps://w3id.org/dpv/risk#DataAggregationBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Data Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataBiasPrefixrisk
    LabelData Bias
    IRIhttps://w3id.org/dpv/risk#DataBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -2424,7 +9305,88 @@

    Classes

    +
    +

    Data Breach

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataBreachPrefixrisk
    LabelData Breach
    IRIhttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in DEX +
    +
    @@ -2432,87 +9394,371 @@

    Classes

    +
    +

    Data Corruption

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataCorruptionPrefixrisk
    LabelData Corruption
    IRIhttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Data Processing Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDataProcessingBiasPrefixrisk
    LabelData Processing Bias
    IRIhttps://w3id.org/dpv/risk#DataProcessingBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Deliberate Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDeliberateIncidentPrefixrisk
    LabelDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to deliberate actions of a human
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    +
    +

    Denial of Service Attack (DoS)

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermDenialServiceAttackPrefixrisk
    LabelDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    - - - - - - - - - - - - - - - - - - - - - - - - - -
    -

    3 Likelihood Levels

    +
    +

    Detection Control

    - + - + - + - + - - @@ -2523,7 +9769,7 @@

    3 Likelihood Levels

    - + @@ -2536,18 +9782,15 @@

    3 Likelihood Levels

    - + - - - - + - @@ -2556,43 +9799,42 @@

    3 Likelihood Levels

    -
    -

    3 Risk Levels

    + + +
    +

    Detriment

    Term3LikelihoodLevelsDetectionControl Prefix risk
    Label3 Likelihood LevelsDetection Control
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevelshttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 3 Likelihood Levels from High to LowControl to detect event
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -2601,7 +9843,7 @@

    3 Risk Levels

    - + @@ -2614,18 +9856,21 @@

    3 Risk Levels

    - + - + + + + - + - @@ -2634,43 +9879,48 @@

    3 Risk Levels

    -
    -

    3 Severity Levels

    + + + +
    +

    Direct Discrimination

    Term3RiskLevelsDetriment Prefix risk
    Label3 Risk LevelsDetriment
    IRIhttps://w3id.org/dpv/risk#3RiskLevelshttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to LowSomething that acts as or causes Detriment
    Date Created2022-08-182022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2679,7 +9929,7 @@

    3 Severity Levels

    - + @@ -2692,18 +9942,15 @@

    3 Severity Levels

    - + - - - - + - @@ -2712,43 +9959,48 @@

    3 Severity Levels

    -
    -

    5 Likelihood Levels

    + + + +
    +

    Disability Discrimination

    Term3SeverityLevelsDirectDiscrimination Prefix risk
    Label3 Severity LevelsDirect Discrimination
    IRIhttps://w3id.org/dpv/risk#3SeverityLevelshttps://w3id.org/dpv/risk#DirectDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:Severity + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 3 Severity Levels from High to LowOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2757,7 +10009,7 @@

    5 Likelihood Levels

    - + @@ -2770,18 +10022,15 @@

    5 Likelihood Levels

    - + - - - - + - @@ -2790,43 +10039,47 @@

    5 Likelihood Levels

    -
    -

    5 Risk Levels

    + + + + +
    +

    Discrimination

    Term5LikelihoodLevelsDisabilityDiscrimination Prefix risk
    Label5 Likelihood LevelsDisability Discrimination
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevelshttps://w3id.org/dpv/risk#DisabilityDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:Likelihood + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very LowDiscrimination against individuals based on physical or mental disabilities
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -2835,7 +10088,7 @@

    5 Risk Levels

    - + @@ -2848,18 +10101,21 @@

    5 Risk Levels

    - + - + + + + - + - @@ -2868,43 +10124,45 @@

    5 Risk Levels

    -
    -

    5 Severity Levels

    + + + +
    +

    Distributed Denial of Service Attack (DDoS)

    Term5RiskLevelsDiscrimination Prefix risk
    Label5 Risk LevelsDiscrimination
    IRIhttps://w3id.org/dpv/risk#5RiskLevelshttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskLevel + risk:RiskConcept +
    Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very Low[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]
    Date Created2022-08-182024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -2913,22 +10171,28 @@

    5 Severity Levels

    - + - + + + + - + - + + + + @@ -2937,7 +10201,7 @@

    5 Severity Levels

    - @@ -2945,42 +10209,42 @@

    5 Severity Levels

    - -
    -

    7 Likelihood Levels

    +
    +

    Environmental Incident

    Term5SeverityLevelsDistributedDenialServiceAttack Prefix risk
    Label5 Severity LevelsDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#5SeverityLevelshttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Severity + risk:DenialServiceAttack + → risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 5 Severity Levels from Very High to Very LowSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -2991,7 +10255,7 @@

    7 Likelihood Levels

    - + @@ -3004,18 +10268,15 @@

    7 Likelihood Levels

    - + - - - - + - @@ -3024,43 +10285,42 @@

    7 Likelihood Levels

    -
    -

    7 Risk Levels

    + + + +
    +

    Environmental Risk

    Term7LikelihoodLevelsEnvironmentalIncident Prefix risk
    Label7 Likelihood LevelsEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevelshttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types dpv:Likelihood + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood + risk:hasIncident
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely LowIncident caused due to environmental factors outside human controls
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -3069,7 +10329,7 @@

    7 Risk Levels

    - + @@ -3080,20 +10340,14 @@

    7 Risk Levels

    - - - - + - - - - + - @@ -3102,43 +10356,44 @@

    7 Risk Levels

    -
    -

    7 Severity Levels

    + + + + +
    +

    Equipment Failure

    Term7RiskLevelsEnvironmentalRisk Prefix risk
    Label7 Risk LevelsEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#7RiskLevelshttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely LowRisks and issues that have their origin in environment or can affect the environment at large
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3147,22 +10402,31 @@

    7 Severity Levels

    - + - + + + + - + + + + - + - + + + + @@ -3171,7 +10435,7 @@

    7 Severity Levels

    - @@ -3179,44 +10443,45 @@

    7 Severity Levels

    -
    -

    Accidental Incident

    + + + + + +
    +

    Equipment Malfunction

    Term7SeverityLevelsEquipmentFailure Prefix risk
    Label7 Severity LevelsEquipment Failure
    IRIhttps://w3id.org/dpv/risk#7SeverityLevelshttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Severity + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely LowSomething that acts as or causes Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3225,28 +10490,40 @@

    Accidental Incident

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -3255,30 +10532,33 @@

    Accidental Incident

    -
    -

    Accidental Misuse

    + + + +
    +

    Erroneous System Use

    TermAccidentalIncidentEquipmentMalfunction Prefix risk
    LabelAccidental IncidentEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#AccidentalIncidenthttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:OperationalSecurityRiskdpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situationsSomething that acts as or causes Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -3297,25 +10577,37 @@

    Accidental Misuse

    - + - + + + + - - - + + + + + + + + + + + + - @@ -3324,41 +10616,45 @@

    Accidental Misuse

    -
    -

    Authorisation Failure

    + + + +
    +

    Ethnic Discrimination

    TermAccidentalMisuseErroneousSystemUse Prefix risk
    LabelAccidental MisuseErroneous System Use
    IRIhttps://w3id.org/dpv/risk#AccidentalMisusehttps://w3id.org/dpv/risk#ErroneousSystemUse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    DefinitionAccidental MisuseSomething that acts as or causes Erroneous System Use
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - @@ -3372,37 +10668,28 @@

    Authorisation Failure

    - + - - - - + - + - - - - - - - - + + - @@ -3411,64 +10698,43 @@

    Authorisation Failure

    -
    -

    None

    + + + +
    +

    Excellence Discrimination

    TermAuthorisationFailureEthnicDiscrimination Prefix risk
    LabelAuthorisation FailureEthnic Discrimination
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailurehttps://w3id.org/dpv/risk#EthnicDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Racism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Racism + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Authorisation FailureDiscrimination against individuals based on their ethnicity or cultural heritage
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - @@ -3480,7 +10746,10 @@

    None

    - + + + + @@ -3490,14 +10759,17 @@

    None

    - + + + + - @@ -3505,44 +10777,46 @@

    None

    -
    -

    Availability Incident

    + + + + + + +
    +

    Exposure to Harmful Speech

    TermAvailabilityBreachExcellenceDiscrimination Prefix risk
    LabelNoneExcellence Discrimination
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreachhttps://w3id.org/dpv/risk#ExcellenceDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3551,28 +10825,40 @@

    Availability Incident

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -3581,48 +10867,40 @@

    Availability Incident

    -
    -

    Avoid Source

    + +
    +

    External Security Threat

    TermAvailabilityIncidentExposureToHarmfulSpeech Prefix risk
    LabelAvailability IncidentExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncidenthttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Incident + risk:SocietalRiskdpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affectedSomething that acts as or causes Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -3631,7 +10909,7 @@

    Avoid Source

    - + @@ -3642,20 +10920,14 @@

    Avoid Source

    - - - - + - - - - + - @@ -3664,35 +10936,40 @@

    Avoid Source

    -
    -

    Benefit

    + + + + +
    +

    Extorsion

    TermAvoidSourceExternalSecurityThreat Prefix risk
    LabelAvoid SourceExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#AvoidSourcehttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSource
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk sourceConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -3706,20 +10983,23 @@

    Benefit

    - + - + + + + - + @@ -3727,13 +11007,13 @@

    Benefit

    - + - @@ -3742,39 +11022,44 @@

    Benefit

    -
    -

    Bias

    +
    +

    Extremely High Likelihood

    TermBenefitExtorsion Prefix risk
    LabelBenefitExtorsion
    IRIhttps://w3id.org/dpv/risk#Benefithttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:FinancialImpact + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes benefitsSomething that acts as or causes Extorsion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-03-232022-08-17
    Date Modified
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel PolleresHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -3783,80 +11068,80 @@

    Bias

    - + - + + + + - - - - + - + - + -
    TermBiasExtremelyHighLikelihood Prefix risk
    LabelBiasExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#Biashttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to othersLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in AI + section RISK-LEVELS in RISK
    - -
    -

    Blackmail

    +
    +

    Extremely High Risk

    - + - + - + - + - - - - + + + + @@ -3865,28 +11150,25 @@

    Blackmail

    - + - + + + + - - - - + - + - - - - + @@ -3895,7 +11177,7 @@

    Blackmail

    - @@ -3904,46 +11186,44 @@

    Blackmail

    -
    -

    Brute Force Authorisations

    +
    +

    Extremely High Severity

    TermBlackmailExtremelyHighRisk Prefix risk
    LabelBlackmailExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#Blackmailhttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes BlackmailLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - - + + + + @@ -3952,28 +11232,25 @@

    Brute Force Authorisations

    - + - + + + + - - - - + - + - - - - + @@ -3982,7 +11259,7 @@

    Brute Force Authorisations

    - @@ -3991,50 +11268,42 @@

    Brute Force Authorisations

    - - - - -
    -

    Change Consequence

    +
    +

    Extremely Low Likelihood

    TermBruteForceAuthorisationsExtremelyHighSeverity Prefix risk
    LabelBrute Force AuthorisationsExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisationshttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniquesLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -4045,9 +11314,12 @@

    Change Consequence

    - + - + + + + @@ -4058,7 +11330,7 @@

    Change Consequence

    - + @@ -4069,7 +11341,7 @@

    Change Consequence

    - @@ -4078,46 +11350,42 @@

    Change Consequence

    -
    -

    Change Impact

    +
    +

    Extremely Low Risk

    TermChangeConsequenceExtremelyLowLikelihood Prefix risk
    LabelChange ConsequenceExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#ChangeConsequencehttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasLikelihood
    DefinitionControl that changes ConsequenceLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -4128,9 +11396,12 @@

    Change Impact

    - + - + + + + @@ -4141,7 +11412,7 @@

    Change Impact

    - + @@ -4152,7 +11423,7 @@

    Change Impact

    - @@ -4161,43 +11432,44 @@

    Change Impact

    -
    -

    Coercion

    +
    +

    Extremely Low Severity

    TermChangeImpactExtremelyLowRisk Prefix risk
    LabelChange ImpactExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#ChangeImpacthttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionControl that changes ImpactLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - + + + + @@ -4206,28 +11478,25 @@

    Coercion

    - + - + + + + - - - - + - + - - - - + @@ -4236,7 +11505,7 @@

    Coercion

    - @@ -4245,36 +11514,38 @@

    Coercion

    -
    -

    Cognitive Bias

    + + + +
    +

    Financial Impact

    TermCoercionExtremelyLowSeverity Prefix risk
    LabelCoercionExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#Coercionhttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes CoercionLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -4287,34 +11558,25 @@

    Cognitive Bias

    - + - - - - + - - - - + - - - - + - @@ -4323,30 +11585,33 @@

    Cognitive Bias

    -
    -

    Compensation

    + + + +
    +

    Financial Loss

    TermCognitiveBiasFinancialImpact Prefix risk
    LabelCognitive BiasFinancial Impact
    IRIhttps://w3id.org/dpv/risk#CognitiveBiashttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when humans are processing and interpreting informationThings that cause or have the potential to impact financial resources
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in AI + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -4365,20 +11630,23 @@

    Compensation

    - + - + + + + - + @@ -4386,13 +11654,13 @@

    Compensation

    - + - @@ -4401,38 +11669,40 @@

    Compensation

    -
    -

    Component Failure

    + + + + +
    +

    Fraud

    TermCompensationFinancialLoss Prefix risk
    LabelCompensationFinancial Loss
    IRIhttps://w3id.org/dpv/risk#Compensationhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other formsSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-04-142022-08-17
    Date Modified
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -4446,28 +11716,37 @@

    Component Failure

    - + - - - - + - + + + + - - - + + + + + + + + + + + + - @@ -4476,38 +11755,45 @@

    Component Failure

    -
    -

    Component Malfunction

    + + + +
    +

    Gender Discrimination

    TermComponentFailureFraud Prefix risk
    LabelComponent FailureFraud
    IRIhttps://w3id.org/dpv/risk#ComponentFailurehttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Component FailureSomething that acts as or causes Fraud
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -4521,12 +11807,9 @@

    Component Malfunction

    - + - - - - + @@ -4535,14 +11818,17 @@

    Component Malfunction

    - + + + + - @@ -4551,44 +11837,43 @@

    Component Malfunction

    -
    -

    Compromise Account

    + + + +
    +

    Geographic Discrimination

    TermComponentMalfunctionGenderDiscrimination Prefix risk
    LabelComponent MalfunctionGender Discrimination
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunctionhttps://w3id.org/dpv/risk#GenderDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept + risk:Sexism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Component MalfunctionDiscrimination based on a person's gender identity or gender expression
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - @@ -4602,37 +11887,28 @@

    Compromise Account

    - + - - - - + - + - - - - - - - - + + - @@ -4641,39 +11917,40 @@

    Compromise Account

    -
    -

    Compromise Account Credentials

    + + + +
    +

    Group Attribution Bias

    TermCompromiseAccountGeographicDiscrimination Prefix risk
    LabelCompromise AccountGeographic Discrimination
    IRIhttps://w3id.org/dpv/risk#CompromiseAccounthttps://w3id.org/dpv/risk#GeographicDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiserDiscrimination based on a person's geographical origin or residence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -4686,7 +11963,7 @@

    Compromise Account Credentials

    - + @@ -4695,28 +11972,25 @@

    Compromise Account Credentials

    - + - + - - - - + - + - @@ -4725,69 +11999,48 @@

    Compromise Account Credentials

    -
    -

    Confidentiality Breach

    +
    +

    Halt Source

    TermCompromiseAccountCredentialsGroupAttributionBias Prefix risk
    LabelCompromise Account CredentialsGroup Attribution Bias
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentialshttps://w3id.org/dpv/risk#GroupAttributionBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Account Credentials to be compromisedBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - - - + + + + @@ -4796,28 +12049,22 @@

    Confidentiality Breach

    - + - - - - + - + - - - - + @@ -4826,7 +12073,7 @@

    Confidentiality Breach

    - @@ -4834,54 +12081,51 @@

    Confidentiality Breach

    -
    -

    Confidentiality Incident

    + + + + +
    +

    Harassment

    TermConfidentialityBreachHaltSource Prefix risk
    LabelConfidentiality BreachHalt Source
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreachhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Confidentiality BreachControl that halts the risk source or prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + - - - - + @@ -4891,17 +12135,14 @@

    Confidentiality Incident

    - - - - + - @@ -4910,37 +12151,38 @@

    Confidentiality Incident

    -
    -

    Confirmation Bias

    + + + +
    +

    Harm

    TermConfidentialityIncidentHarassment Prefix risk
    LabelConfidentiality IncidentHarassment
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncidenthttps://w3id.org/dpv/risk#Harassment
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -4953,34 +12195,37 @@

    Confirmation Bias

    - + - + + + + - - - - + - + - + + + + - + - @@ -4989,42 +12234,62 @@

    Confirmation Bias

    -
    -

    Confounding Variables Bias

    + + + + + + + + + + +
    +

    High Likelihood

    TermConfirmationBiasHarm Prefix risk
    LabelConfirmation BiasHarm
    IRIhttps://w3id.org/dpv/risk#ConfirmationBiashttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:IndividualRisk
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of informationSomething that acts as or causes Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    Source
    Date Created2024-09-132022-08-13
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - + + + + @@ -5033,34 +12298,34 @@

    Confounding Variables Bias

    - + - + + + + - - - - + - + - + - @@ -5069,45 +12334,50 @@

    Confounding Variables Bias

    -
    -

    Consequence Control

    +
    +

    High Risk

    TermConfoundingVariablesBiasHighLikelihood Prefix risk
    LabelConfounding Variables BiasHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBiashttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious associationLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -5118,9 +12388,12 @@

    Consequence Control

    - + - + + + + @@ -5131,7 +12404,7 @@

    Consequence Control

    - + @@ -5142,7 +12415,7 @@

    Consequence Control

    - @@ -5151,45 +12424,50 @@

    Consequence Control

    -
    -

    Containment Control

    +
    +

    High Severity

    TermConsequenceControlHighRisk Prefix risk
    LabelConsequence ControlHigh Risk
    IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasRiskLevel
    DefinitionRisk Mitigation Measure that controls the ConsequencesLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -5200,9 +12478,12 @@

    Containment Control

    - + - + + + + @@ -5213,15 +12494,18 @@

    Containment Control

    - + - + + + + - @@ -5230,35 +12514,45 @@

    Containment Control

    -
    -

    Copyright Violation

    + + + +
    +

    Homophobia

    TermContainmentControlHighSeverity Prefix risk
    LabelContainment ControlHigh Severity
    IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasSeverity
    DefinitionControl to contain eventLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + @@ -5272,80 +12566,69 @@

    Copyright Violation

    - + - - - - + - + - - - - - - - - + + -
    TermCopyrightViolationHomophobia Prefix risk
    LabelCopyright ViolationHomophobia
    IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#Homophobia
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Copyright ViolationHostility or prejudice against individuals who are or are perceived to be homosexual
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - - -
    -

    Coverage Bias

    + + + +
    +

    Human Errors

    - + - + - + - + - @@ -5358,7 +12641,7 @@

    Coverage Bias

    - + @@ -5367,25 +12650,28 @@

    Coverage Bias

    - + - + - + + + + - + - @@ -5393,42 +12679,46 @@

    Coverage Bias

    -
    -

    Cross-Border Incident

    + +
    +

    Identification Control

    TermCoverageBiasHumanErrors Prefix risk
    LabelCoverage BiasHuman Errors
    IRIhttps://w3id.org/dpv/risk#CoverageBiashttps://w3id.org/dpv/risk#HumanErrors
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:UserRisks + → dpv:RiskConcept
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being usedSomething that acts as or causes Human Errors
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -5439,7 +12729,7 @@

    Cross-Border Incident

    - + @@ -5460,7 +12750,7 @@

    Cross-Border Incident

    - @@ -5469,38 +12759,40 @@

    Cross-Border Incident

    -
    -

    Cryptojacking

    + + + + +
    +

    Identity Fraud

    TermCrossBorderIncidentIdentificationControl Prefix risk
    LabelCross-Border IncidentIdentification Control
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionIncident involving cross-border or multiple jurisdictionsControl to identify characteristics of event
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -5514,7 +12806,7 @@

    Cryptojacking

    - + @@ -5523,7 +12815,7 @@

    Cryptojacking

    - + @@ -5544,7 +12836,7 @@

    Cryptojacking

    - @@ -5553,35 +12845,40 @@

    Cryptojacking

    -
    -

    Damage

    + + + + +
    +

    Identity Theft

    TermCryptojackingIdentityFraud Prefix risk
    LabelCryptojackingIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes CryptojackingSomething that acts as or causes Identity Fraud
    SourceENISA Threat Landscape 2021ENISA Threat Taxonomy 2016
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -5595,20 +12892,23 @@

    Damage

    - + - + + + + - + @@ -5622,7 +12922,7 @@

    Damage

    - @@ -5631,37 +12931,38 @@

    Damage

    -
    -

    Data Aggregation Bias

    + + +
    +

    Illegal Data Processing

    TermDamageIdentityTheft Prefix risk
    LabelDamageIdentity Theft
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:LegalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes DamageSomething that acts as or causes Identity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2022-03-302022-08-17
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -5674,34 +12975,40 @@

    Data Aggregation Bias

    - + - + + + + - + - + - + + + + - + - @@ -5710,40 +13017,47 @@

    Data Aggregation Bias

    -
    -

    Data Bias

    +
    +

    Impact Control

    TermDataAggregationBiasIllegalDataProcessing Prefix risk
    LabelData Aggregation BiasIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#DataAggregationBiashttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:LegalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the dataSomething that acts as or causes Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -5752,34 +13066,31 @@

    Data Bias

    - + - - - - + - + - + - @@ -5788,49 +13099,40 @@

    Data Bias

    -
    -

    Data Breach

    + + + +
    +

    Implicit Bias

    TermDataBiasImpactControl Prefix risk
    LabelData BiasImpact Control
    IRIhttps://w3id.org/dpv/risk#DataBiashttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groupsRisk Mitigation Measure that controls Impacts
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - @@ -5843,40 +13145,34 @@

    Data Breach

    - + - - - - + - + - - - - + - + - @@ -5884,44 +13180,43 @@

    Data Breach

    - -
    -

    Data Corruption

    +
    +

    Incident

    TermDataBreachImplicitBias Prefix risk
    LabelData BreachImplicit Bias
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#ImplicitBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Data BreachBias that occurs when a human makes an association or assumption based on their mental models and memories
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - + + + + @@ -5930,26 +13225,26 @@

    Data Corruption

    - + - + + + + - - - - + - + @@ -5957,56 +13252,65 @@

    Data Corruption

    - + -
    TermDataCorruptionIncident Prefix risk
    LabelData CorruptionIncident
    IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes Corruption of DataAn actual or occured event
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0Incident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified
    ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section RISK-CONSEQUENCES in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + - -
    -

    Data Processing Bias

    +
    +

    Incident Assessment Report

    - + - + - + - + - - + + + + @@ -6015,34 +13319,28 @@

    Data Processing Bias

    - + - - - - + - + - - - - + - @@ -6050,42 +13348,45 @@

    Data Processing Bias

    -
    -

    Deliberate Incident

    + +
    +

    Incident Concluded

    TermDataProcessingBiasIncidentAssessmentReport Prefix risk
    LabelData Processing BiasIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#DataProcessingBiashttps://w3id.org/dpv/risk#IncidentAssessmentReport
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any biasA report describing the assessment of an incident in terms of its effects or impacts
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -6096,7 +13397,7 @@

    Deliberate Incident

    - + @@ -6109,15 +13410,18 @@

    Deliberate Incident

    - + - + + + + - @@ -6125,44 +13429,48 @@

    Deliberate Incident

    - -
    -

    Denial of Service Attack (DoS)

    +
    +

    Incident Concluding Report

    TermDeliberateIncidentIncidentConcluded Prefix risk
    LabelDeliberate IncidentIncident Concluded
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#IncidentConcluded
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation risk:hasIncident + dpv:hasContext, + dpv:hasStatus
    DefinitionIncident caused due to deliberate actions of a humanThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - + + + + @@ -6171,37 +13479,28 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + - - - - - - - - + + - @@ -6209,46 +13508,46 @@

    Denial of Service Attack (DoS)

    - -
    -

    Detection Control

    +
    +

    Incident Detection Report

    TermDenialServiceAttackIncidentConcludingReport Prefix risk
    LabelDenial of Service Attack (DoS)Incident Concluding Report
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -6259,7 +13558,7 @@

    Detection Control

    - + @@ -6280,7 +13579,7 @@

    Detection Control

    - @@ -6289,40 +13588,46 @@

    Detection Control

    -
    -

    Detriment

    +
    +

    Incident Halted

    TermDetectionControlIncidentDetectionReport Prefix risk
    LabelDetection ControlIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionControl to detect eventA report describing the detection of a Incident
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -6331,7 +13636,7 @@

    Detriment

    - + @@ -6344,21 +13649,18 @@

    Detriment

    - + - - - - + - + - @@ -6366,41 +13668,48 @@

    Detriment

    - -
    -

    Discrimination

    +
    +

    Incident Handling Report

    TermDetrimentIncidentHalted Prefix risk
    LabelDetrimentIncident Halted
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes DetrimentThe incident has halted or paused with a high likelihood of resuming or recurring
    Date Created2022-03-232024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -6409,7 +13718,7 @@

    Discrimination

    - + @@ -6422,21 +13731,15 @@

    Discrimination

    - + - - - - - - - - + + - @@ -6444,41 +13747,33 @@

    Discrimination

    - -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    Incident Identifier

    TermDiscriminationIncidentHandlingReport Prefix risk
    LabelDiscriminationIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#IncidentHandlingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes DiscriminationA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Date Created2022-08-192024-05-19
    Date Modified2024-08-16
    ContributorsGeorg P. Krog
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -6490,37 +13785,28 @@

    Distributed Denial of Service Attack (DDoS)

    - + - - - - + - + - - - - - - - - + + - @@ -6528,23 +13814,23 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Environmental Incident

    +
    +

    Incident Impact Assessment

    TermDistributedDenialServiceAttackIncidentIdentifier Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)Incident Identifier
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Identifier associated with an incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + @@ -6556,14 +13842,21 @@

    Environmental Incident

    - - @@ -6574,7 +13867,7 @@

    Environmental Incident

    - + @@ -6590,7 +13883,10 @@

    Environmental Incident

    - + + + + @@ -6604,39 +13900,46 @@

    Environmental Incident

    -
    -

    Environmental Risk

    +
    +

    Incident Mitigated

    TermEnvironmentalIncidentIncidentImpactAssessment Prefix risk
    LabelEnvironmental IncidentIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Broader/Parent types risk:Incident - → dpv:RiskConcept + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionIncident caused due to environmental factors outside human controlsAn impact assessment associated with a incident
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - + + + + @@ -6645,7 +13948,7 @@

    Environmental Risk

    - + @@ -6656,14 +13959,20 @@

    Environmental Risk

    - + + + + - + + + + - @@ -6671,44 +13980,45 @@

    Environmental Risk

    - -
    -

    Equipment Failure

    +
    +

    Incident Mitigation Measure

    TermEnvironmentalRiskIncidentMitigated Prefix risk
    LabelEnvironmental RiskIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionRisks and issues that have their origin in environment or can affect the environment at largeThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - + + + + @@ -6717,40 +14027,28 @@

    Equipment Failure

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -6759,43 +14057,46 @@

    Equipment Failure

    -
    -

    Equipment Malfunction

    +
    +

    Incident Near Miss

    TermEquipmentFailureIncidentMitigationMeasure Prefix risk
    LabelEquipment FailureIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
    DefinitionSomething that acts as or causes Equipment FailureA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -6804,31 +14105,22 @@

    Equipment Malfunction

    - + - - - - + - - - - + - + - - - - + @@ -6837,7 +14129,7 @@

    Equipment Malfunction

    - @@ -6845,41 +14137,47 @@

    Equipment Malfunction

    - -
    -

    Erroneous System Use

    +
    +

    Incident Notice

    TermEquipmentMalfunctionIncidentNearMiss Prefix risk
    LabelEquipment MalfunctionIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Equipment MalfunctionThe state where an incident was almost successful in taking place i.e. "it came very close"
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -6888,37 +14186,28 @@

    Erroneous System Use

    - + - - - - + - + - - - - - - - - + + - @@ -6927,42 +14216,46 @@

    Erroneous System Use

    - - -
    -

    Exposure to Harmful Speech

    +
    +

    Incident Ongoing

    TermErroneousSystemUseIncidentNotice Prefix risk
    LabelErroneous System UseIncident Notice
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Erroneous System UseNotice associated with an Incident
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -6971,31 +14264,22 @@

    Exposure to Harmful Speech

    - + - - - - + - - - - + - + - - - - + @@ -7004,7 +14288,7 @@

    Exposure to Harmful Speech

    - @@ -7012,40 +14296,48 @@

    Exposure to Harmful Speech

    - -
    -

    External Security Threat

    +
    +

    Incident Ongoing Report

    TermExposureToHarmfulSpeechIncidentOngoing Prefix risk
    LabelExposure to Harmful SpeechIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Harmful SpeechThe incident is ongoing i.e. still active
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -7054,7 +14346,7 @@

    External Security Threat

    - + @@ -7065,14 +14357,17 @@

    External Security Threat

    - + + + + - @@ -7080,44 +14375,48 @@

    External Security Threat

    - -
    -

    Extorsion

    +
    +

    Incident Preliminary Report

    TermExternalSecurityThreatIncidentOngoingReport Prefix risk
    LabelExternal Security ThreatIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionConcepts associated with security threats that are likely to originate externallyA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Date Created2024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -7126,37 +14425,28 @@

    Extorsion

    - + - - - - + - + - - - - - - - - + + - @@ -7164,43 +14454,45 @@

    Extorsion

    - -
    -

    Extremely High Likelihood

    +
    +

    Incident Register

    TermExtorsionIncidentPreliminaryReport Prefix risk
    LabelExtorsionIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes ExtorsionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7211,12 +14503,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -7227,7 +14516,7 @@

    Extremely High Likelihood

    - + @@ -7238,7 +14527,7 @@

    Extremely High Likelihood

    - @@ -7246,43 +14535,45 @@

    Extremely High Likelihood

    - -
    -

    Extremely High Risk

    +
    +

    Incident Report

    TermExtremelyHighLikelihoodIncidentRegister Prefix risk
    LabelExtremely High LikelihoodIncident Register
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Likelihood is Extremely HighA register recording incidentes, their reports, notifications, and other related activities
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7293,12 +14584,9 @@

    Extremely High Risk

    - + - - - - + @@ -7309,18 +14597,15 @@

    Extremely High Risk

    - + - - - - + - @@ -7328,43 +14613,43 @@

    Extremely High Risk

    - -
    -

    Extremely High Severity

    +
    +

    Incident Status

    TermExtremelyHighRiskIncidentReport Prefix risk
    LabelExtremely High RiskIncident Report
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#IncidentReport
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasRiskLevel + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Risk is Extremely HighDocumented information about an incident, its handling, assessments,and notifications
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -7375,13 +14660,13 @@

    Extremely High Severity

    - + - - - - + + + + @@ -7391,7 +14676,7 @@

    Extremely High Severity

    - + @@ -7402,7 +14687,7 @@

    Extremely High Severity

    - @@ -7411,42 +14696,44 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    +
    +

    Incident Status Unknown

    TermExtremelyHighSeverityIncidentStatus Prefix risk
    LabelExtremely High SeverityIncident Status
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#IncidentStatus
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:Status + → dpv:Context
    Object of relation dpv:hasSeverity + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Severity is Extremely HighStatus associated with an incident
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in DEX
    - + - + - + - + - - @@ -7457,12 +14744,9 @@

    Extremely Low Likelihood

    - + - - - - + @@ -7473,7 +14757,7 @@

    Extremely Low Likelihood

    - + @@ -7484,7 +14768,7 @@

    Extremely Low Likelihood

    - @@ -7493,42 +14777,44 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    +
    +

    Incident Suspected

    TermExtremelyLowLikelihoodIncidentStatusUnknown Prefix risk
    LabelExtremely Low LikelihoodIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#IncidentStatusUnknown
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasLikelihood + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Likelihood is Extremely LowThe status of a incident is unknown
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -7539,12 +14825,9 @@

    Extremely Low Risk

    - + - - - - + @@ -7555,7 +14838,7 @@

    Extremely Low Risk

    - + @@ -7566,7 +14849,7 @@

    Extremely Low Risk

    - @@ -7574,43 +14857,46 @@

    Extremely Low Risk

    - -
    -

    Extremely Low Severity

    +
    +

    Incident Suspected Report

    TermExtremelyLowRiskIncidentSuspected Prefix risk
    LabelExtremely Low RiskIncident Suspected
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasRiskLevel + dpv:hasContext, + dpv:hasStatus
    DefinitionLevel where Risk is Extremely LowThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -7621,12 +14907,9 @@

    Extremely Low Severity

    - + - - - - + @@ -7637,18 +14920,15 @@

    Extremely Low Severity

    - + - - - - + - @@ -7657,40 +14937,46 @@

    Extremely Low Severity

    -
    -

    Fee

    +
    +

    Incident Terminated

    TermExtremelyLowSeverityIncidentSuspectedReport Prefix risk
    LabelExtremely Low SeverityIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#IncidentSuspectedReport
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Severity is Extremely LowA report describing the suspicion of an incident in the past or occuring
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -7699,37 +14985,31 @@

    Fee

    - + - - - - + - + - - - - + - + - @@ -7738,35 +15018,44 @@

    Fee

    -
    -

    Financial Impact

    + + + +
    +

    Indirect Discrimination

    TermFeeIncidentTerminated Prefix risk
    LabelFeeIncident Terminated
    IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#IncidentTerminated
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or provides fees e.g. for using a serviceThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    Source
    Date Created2024-04-142024-02-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - + + @@ -7779,7 +15068,7 @@

    Financial Impact

    - + @@ -7790,14 +15079,17 @@

    Financial Impact

    - + + + + - @@ -7806,36 +15098,38 @@

    Financial Impact

    -
    -

    Financial Loss

    + + + +
    +

    Individual Health & Safety

    TermFinancialImpactIndirectDiscrimination Prefix risk
    LabelFinancial ImpactIndirect Discrimination
    IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#IndirectDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionThings that cause or have the potential to impact financial resourcesOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-09-30
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7846,39 +15140,24 @@

    Financial Loss

    - - - - + - - - - + - - - - - - - - - - - - + + + - @@ -7887,40 +15166,35 @@

    Financial Loss

    -
    -

    Fraud

    + + +
    +

    Individual Risk

    TermFinancialLossIndividualHealthSafety Prefix risk
    LabelFinancial LossIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IndividualRisk
    DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -7932,37 +15206,25 @@

    Fraud

    - + - - - - + - - - - - - - - - - - - + + + - @@ -7971,37 +15233,38 @@

    Fraud

    -
    -

    Group Attribution Bias

    + + + +
    +

    Informativeness Bias

    TermFraudIndividualRisk Prefix risk
    LabelFraudIndividual Risk
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes FraudRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8014,7 +15277,7 @@

    Group Attribution Bias

    - + @@ -8035,13 +15298,13 @@

    Group Attribution Bias

    - + - @@ -8050,48 +15313,44 @@

    Group Attribution Bias

    -
    -

    Halt Source

    + + + +
    +

    In-Group Bias

    TermGroupAttributionBiasInformativenessBias Prefix risk
    LabelGroup Attribution BiasInformativeness Bias
    IRIhttps://w3id.org/dpv/risk#GroupAttributionBiashttps://w3id.org/dpv/risk#InformativenessBias
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:EngineeringDecisionBias
    DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that groupBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8100,31 +15359,34 @@

    Halt Source

    - + - + + + + - + - + - @@ -8133,35 +15395,39 @@

    Halt Source

    -
    -

    Harm

    + + + +
    +

    Injury

    TermHaltSourceInGroupBias Prefix risk
    LabelHalt SourceIn-Group Bias
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#InGroupBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialisingBias that occurs when showing partiality to one's own group or own characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8174,23 +15440,23 @@

    Harm

    - + - - - - + - + + + + - + @@ -8204,7 +15470,7 @@

    Harm

    - @@ -8217,72 +15483,50 @@

    Harm

    - - - - - - -
    -

    High Likelihood

    +
    +

    None

    TermHarmInjury Prefix risk
    LabelHarmInjury
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Harm to humansSomething that acts as or causes Injury
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceISO/IEC 27005:2018
    Date Created2022-08-132022-08-17
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + - - - - - - - - + + @@ -8291,20 +15535,14 @@

    High Likelihood

    - - - - + - - - - + - @@ -8312,53 +15550,39 @@

    High Likelihood

    - -
    -

    High Risk

    +
    +

    Integrity Concept

    TermHighLikelihoodIntegrityBreach Prefix risk
    LabelHigh LikelihoodNone
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -8367,11 +15591,11 @@

    High Risk

    - + - + @@ -8383,7 +15607,7 @@

    High Risk

    - + @@ -8394,7 +15618,7 @@

    High Risk

    - @@ -8402,51 +15626,42 @@

    High Risk

    - -
    -

    High Severity

    +
    +

    Integrity Incident

    TermHighRiskIntegrityConcept Prefix risk
    LabelHigh RiskIntegrity Concept
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IntegrityConcept
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2022-08-182024-09-29
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - @@ -8457,12 +15672,9 @@

    High Severity

    - + - - - - + @@ -8473,18 +15685,15 @@

    High Severity

    - + - - - - + - @@ -8493,35 +15702,39 @@

    High Severity

    -
    -

    Human Errors

    + + + +
    +

    Intentional Misuse

    TermHighSeverityIntegrityIncident Prefix risk
    LabelHigh SeverityIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IntegrityIncident
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasSeverity + risk:hasIncident
    DefinitionLevel where Severity is HighIncident where the integrity of information or system has been affected
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - @@ -8535,37 +15748,25 @@

    Human Errors

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8574,47 +15775,45 @@

    Human Errors

    -
    -

    Identification Control

    + + + + +
    +

    Intercept Communications

    TermHumanErrorsIntentionalMisuse Prefix risk
    LabelHuman ErrorsIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UserRisks + risk:Misuse + → risk:UserRisksdpv:RiskConcept
    DefinitionSomething that acts as or causes Human ErrorsIntentional Misuse
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8623,28 +15822,40 @@

    Identification Control

    - + - + + + + - + + + + - + - - + + + + + + + + - @@ -8653,38 +15864,43 @@

    Identification Control

    -
    -

    Identity Fraud

    + + + + + + + +
    +

    Judicial Costs

    TermIdentificationControlInterceptCommunications Prefix risk
    LabelIdentification ControlIntercept Communications
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to identify characteristics of eventSomething that acts as or causes Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -8698,37 +15914,25 @@

    Identity Fraud

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8737,38 +15941,39 @@

    Identity Fraud

    -
    -

    Identity Theft

    + + + +
    +

    Judicial Penalty

    TermIdentityFraudJudicialCosts Prefix risk
    LabelIdentity FraudJudicial Costs
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialLoss + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that acts as or causes Identity FraudSomething that involves or causes judicial costs to be paid
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -8782,37 +15987,25 @@

    Identity Theft

    - + - - - - + - - - - - - - - - - - - + + + - @@ -8821,35 +16014,43 @@

    Identity Theft

    -
    -

    Illegal Data Processing

    + + + +
    +

    Language Discrimination

    TermIdentityTheftJudicialPenalty Prefix risk
    LabelIdentity TheftJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialLoss + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that acts as or causes Identity TheftSomething that involves or causes judicial penalties to be paid
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -8863,40 +16064,28 @@

    Illegal Data Processing

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -8905,47 +16094,41 @@

    Illegal Data Processing

    -
    -

    Impact Control

    + + +
    +

    Legal Risk

    TermIllegalDataProcessingLanguageDiscrimination Prefix risk
    LabelIllegal Data ProcessingLanguage Discrimination
    IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#LanguageDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Illegal Processing of DataDiscrimination based on a person's language, often linked to national origin or ethnicity
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8954,7 +16137,7 @@

    Impact Control

    - + @@ -8965,20 +16148,14 @@

    Impact Control

    - - - - + - - - - + - @@ -8987,37 +16164,39 @@

    Impact Control

    -
    -

    Implicit Bias

    + + + +
    +

    Lose of Credibility

    TermImpactControlLegalRisk Prefix risk
    LabelImpact ControlLegal Risk
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#LegalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls ImpactsRisks and issues that have their basis in legal requirements and enforcement
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9030,7 +16209,7 @@

    Implicit Bias

    - + @@ -9039,25 +16218,28 @@

    Implicit Bias

    - + - + - + + + + - + - @@ -9065,43 +16247,44 @@

    Implicit Bias

    -
    -

    Incident

    + + + + +
    +

    Lose of Customer Confidence

    TermImplicitBiasLoseCredibility Prefix risk
    LabelImplicit BiasLose of Credibility
    IRIhttps://w3id.org/dpv/risk#ImplicitBiashttps://w3id.org/dpv/risk#LoseCredibility
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ReputationalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when a human makes an association or assumption based on their mental models and memoriesSomething that acts as or causes Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9110,26 +16293,23 @@

    Incident

    - + - - - - - - - + - + + + + - + @@ -9137,65 +16317,58 @@

    Incident

    - + -
    TermIncidentLoseCustomerConfidence Prefix risk
    LabelIncidentLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionAn actual or occured eventSomething that acts as or causes Loss of Customer Confidence
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
    See More: section CORE in DEX - , section INCIDENT in DEX + section RISK-TAXONOMY in RISK
    - - -
    -

    Incident Assessment Report

    + + + + +
    +

    Lose of Goodwill

    - + - + - + - + - - - - - + @@ -9204,28 +16377,37 @@

    Incident Assessment Report

    - + - + + + + - + - - + + + + + + + + - @@ -9234,46 +16416,43 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    + + + +
    +

    Lose of Negotiating Capacity

    TermIncidentAssessmentReportLoseGoodwill Prefix risk
    LabelIncident Assessment ReportLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsSomething that acts as or causes Loss of Goodwill
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9282,22 +16461,28 @@

    Incident Concluded

    - + - + + + + - + - + + + + @@ -9306,7 +16491,7 @@

    Incident Concluded

    - @@ -9314,48 +16499,44 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + + + + +
    +

    Lose of Opportunity

    TermIncidentConcludedLoseNegotiatingCapacity Prefix risk
    LabelIncident ConcludedLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringSomething that acts as or causes Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9364,28 +16545,37 @@

    Incident Concluding Report

    - + - + + + + - + - - + + + + + + + + - @@ -9393,48 +16583,44 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    + + + + +
    +

    Lose of Reputation

    TermIncidentConcludingReportLoseOpportunity Prefix risk
    LabelIncident Concluding ReportLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#LoseOpportunity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownSomething that acts as or causes Loss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9443,28 +16629,37 @@

    Incident Detection Report

    - + - + + + + - + - - + + + + + + + + - @@ -9473,46 +16668,43 @@

    Incident Detection Report

    -
    -

    Incident Halted

    + + + +
    +

    Lose of Trust

    TermIncidentDetectionReportLoseReputation Prefix risk
    LabelIncident Detection ReportLose of Reputation
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the detection of a IncidentSomething that acts as or causes Loss of Reputation
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9521,22 +16713,28 @@

    Incident Halted

    - + - + + + + - + - + + + + @@ -9545,7 +16743,7 @@

    Incident Halted

    - @@ -9553,46 +16751,51 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + +
    +

    Low Likelihood

    TermIncidentHaltedLoseTrust Prefix risk
    LabelIncident HaltedLose of Trust
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ReputationalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringSomething that acts as or causes Loss of Trust
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -9603,9 +16806,12 @@

    Incident Handling Report

    - + - + + + + @@ -9616,15 +16822,18 @@

    Incident Handling Report

    - + - + + + + - @@ -9632,36 +16841,53 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + +
    +

    Low Risk

    TermIncidentHandlingReportLowLikelihood Prefix risk
    LabelIncident Handling ReportLow Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasLikelihood
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + + + + - + + + + @@ -9670,9 +16896,12 @@

    Incident Identifier

    - + - + + + + @@ -9683,15 +16912,18 @@

    Incident Identifier

    - + - + + + + - @@ -9699,49 +16931,51 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + +
    +

    Low Severity

    TermIncidentIdentifierLowRisk Prefix risk
    LabelIncident IdentifierLow Risk
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionIdentifier associated with an incidentLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -9752,9 +16986,12 @@

    Incident Impact Assessment

    - + - + + + + @@ -9765,7 +17002,7 @@

    Incident Impact Assessment

    - + @@ -9776,7 +17013,7 @@

    Incident Impact Assessment

    - @@ -9785,46 +17022,43 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    + + + +
    +

    Malicious Activity

    TermIncidentImpactAssessmentLowSeverity Prefix risk
    LabelIncident Impact AssessmentLow Severity
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasSeverity
    DefinitionAn impact assessment associated with a incidentLevel where Severity is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - + @@ -9833,7 +17067,7 @@

    Incident Mitigated

    - + @@ -9844,20 +17078,14 @@

    Incident Mitigated

    - - - - + - - - - + - @@ -9865,45 +17093,47 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + + + + + + +
    +

    Malicious Code Attack

    TermIncidentMitigatedMaliciousActivity Prefix risk
    LabelIncident MitigatedMalicious Activity
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#MaliciousActivity
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9912,28 +17142,37 @@

    Incident Mitigation Measure

    - + - + + + + - + - - + + + + + + + + - @@ -9942,46 +17181,46 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + + + +
    +

    Malware Attack

    TermIncidentMitigationMeasureMaliciousCodeAttack Prefix risk
    LabelIncident Mitigation MeasureMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againSomething that acts as or causes Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -9990,22 +17229,28 @@

    Incident Near Miss

    - + - + + + + - + - + + + + @@ -10014,7 +17259,7 @@

    Incident Near Miss

    - @@ -10022,47 +17267,44 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + + + + +
    +

    Material Damage

    TermIncidentNearMissMalwareAttack Prefix risk
    LabelIncident Near MissMalware Attack
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Something that acts as or causes Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - + + + @@ -10071,9 +17313,12 @@

    Incident Notice

    - + - + + + + @@ -10084,15 +17329,21 @@

    Incident Notice

    - + - - + + + + + + + + - @@ -10101,46 +17352,50 @@

    Incident Notice

    -
    -

    Incident Ongoing

    + + + +
    +

    Misandry

    TermIncidentNoticeMaterialDamage Prefix risk
    LabelIncident NoticeMaterial Damage
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#MaterialDamage
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an IncidentSomething that acts as or causes Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-05-192022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -10149,7 +17404,7 @@

    Incident Ongoing

    - + @@ -10162,18 +17417,15 @@

    Incident Ongoing

    - + - - - - + - @@ -10181,48 +17433,51 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    + + + + +
    +

    Misogyny

    TermIncidentOngoingMisandry Prefix risk
    LabelIncident OngoingMisandry
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#Misandry
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident is ongoing i.e. still activeDislike, contempt, or prejudice against men
    Date Created2024-02-142024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + - - - - + @@ -10231,7 +17486,7 @@

    Incident Ongoing Report

    - + @@ -10244,7 +17499,7 @@

    Incident Ongoing Report

    - + @@ -10252,7 +17507,7 @@

    Incident Ongoing Report

    - @@ -10260,48 +17515,44 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + + + + +
    +

    Misuse

    TermIncidentOngoingReportMisogyny Prefix risk
    LabelIncident Ongoing ReportMisogyny
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#Misogyny
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedDislike, contempt, or prejudice against women
    Date Created2024-05-192024-09-30
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -10310,7 +17561,7 @@

    Incident Preliminary Report

    - + @@ -10323,15 +17574,21 @@

    Incident Preliminary Report

    - + - - + + + + + + + + - @@ -10339,45 +17596,51 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + +
    +

    Moderate Likelihood

    TermIncidentPreliminaryReportMisuse Prefix risk
    LabelIncident Preliminary ReportMisuse
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UserRisks + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownSomething that acts as or causes Misuse
    Date Created2024-05-192024-06-11
    Date Modified2024-08-16
    ContributorsDelaram Golpayegani
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -10388,9 +17651,12 @@

    Incident Register

    - + - + + + + @@ -10401,7 +17667,7 @@

    Incident Register

    - + @@ -10412,7 +17678,7 @@

    Incident Register

    - @@ -10420,45 +17686,51 @@

    Incident Register

    -
    -

    Incident Report

    + +
    +

    Moderate Risk

    TermIncidentRegisterModerateLikelihood Prefix risk
    LabelIncident RegisterModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasLikelihood
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -10469,9 +17741,12 @@

    Incident Report

    - + - + + + + @@ -10482,15 +17757,18 @@

    Incident Report

    - + - + + + + - @@ -10498,43 +17776,51 @@

    Incident Report

    -
    -

    Incident Status

    + +
    +

    Moderate Severity

    TermIncidentReportModerateRisk Prefix risk
    LabelIncident ReportModerate Risk
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasRiskLevel
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - @@ -10545,13 +17831,13 @@

    Incident Status

    - + + + + + - - - - @@ -10561,7 +17847,7 @@

    Incident Status

    - + @@ -10572,7 +17858,7 @@

    Incident Status

    - @@ -10581,44 +17867,46 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Monitor Consequence

    TermIncidentStatusModerateSeverity Prefix risk
    LabelIncident StatusModerate Severity
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Status - → dpv:Context + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasSeverity
    DefinitionStatus associated with an incidentLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-142022-08-18
    See More: section INCIDENT-STATUS in DEX + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -10629,7 +17917,7 @@

    Incident Status Unknown

    - + @@ -10642,7 +17930,7 @@

    Incident Status Unknown

    - + @@ -10653,7 +17941,7 @@

    Incident Status Unknown

    - @@ -10662,44 +17950,45 @@

    Incident Status Unknown

    -
    -

    Incident Suspected

    +
    +

    Monitor Control

    TermIncidentStatusUnknownMonitorConsequence Prefix risk
    LabelIncident Status UnknownMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe status of a incident is unknownControl that monitors a Risk Consequence
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10710,9 +17999,12 @@

    Incident Suspected

    - + - + + + + @@ -10723,7 +18015,7 @@

    Incident Suspected

    - + @@ -10734,7 +18026,7 @@

    Incident Suspected

    - @@ -10742,46 +18034,47 @@

    Incident Suspected

    -
    -

    Incident Suspected Report

    + +
    +

    Monitor Impact

    TermIncidentSuspectedMonitorControl Prefix risk
    LabelIncident SuspectedMonitor Control
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10792,7 +18085,7 @@

    Incident Suspected Report

    - + @@ -10808,12 +18101,15 @@

    Incident Suspected Report

    - + + + + - @@ -10822,44 +18118,46 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    +
    +

    Monitor Risk

    TermIncidentSuspectedReportMonitorImpact Prefix risk
    LabelIncident Suspected ReportMonitor Impact
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionA report describing the suspicion of an incident in the past or occuringControl that monitors a Risk Impact
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -10870,7 +18168,7 @@

    Incident Terminated

    - + @@ -10883,7 +18181,7 @@

    Incident Terminated

    - + @@ -10894,7 +18192,7 @@

    Incident Terminated

    - @@ -10903,46 +18201,58 @@

    Incident Terminated

    -
    -

    Individual Health & Safety

    +
    +

    Monitor Control

    TermIncidentTerminatedMonitorRisk Prefix risk
    LabelIncident TerminatedMonitor Risk
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringControl that monitors a Risk
    Date Created2024-02-142024-05-19
    See More: section INCIDENT-STATUS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + - + + + + @@ -10952,14 +18262,20 @@

    Individual Health & Safety

    - + + + + - + + + + - @@ -10967,36 +18283,49 @@

    Individual Health & Safety

    -
    -

    Individual Risk

    + +
    +

    Monitor Risk Source

    TermIndividualHealthSafetyMonitorRiskControl Prefix risk
    LabelIndividual Health & SafetyMonitor Control
    IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IndividualRisk + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that monitors another Control
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + + - + + + + @@ -11005,7 +18334,7 @@

    Individual Risk

    - + @@ -11016,14 +18345,20 @@

    Individual Risk

    - + + + + - + + + + - @@ -11032,39 +18367,48 @@

    Individual Risk

    -
    -

    Informativeness Bias

    +
    +

    Monitor Vulnerabilities

    TermIndividualRiskMonitorRiskSource Prefix risk
    LabelIndividual RiskMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionRisks and issues that affect or have the potential to affect specific individualsControl that monitors a Risk Source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -11073,34 +18417,31 @@

    Informativeness Bias

    - + - - - - + - + - + - @@ -11109,37 +18450,44 @@

    Informativeness Bias

    -
    -

    In-Group Bias

    + + + +
    +

    Nationality Discrimination

    TermInformativenessBiasMonitorVulnerabilities Prefix risk
    LabelInformativeness BiasMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#InformativenessBiashttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:EngineeringDecisionBias + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some groupControl that monitors a Risk Vulnerability
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + @@ -11152,34 +18500,28 @@

    In-Group Bias

    - + - - - - + - + - - - - + - @@ -11188,35 +18530,39 @@

    In-Group Bias

    -
    -

    Injury

    + + + +
    +

    Non-Material Damage

    TermInGroupBiasNationalityDiscrimination Prefix risk
    LabelIn-Group BiasNationality Discrimination
    IRIhttps://w3id.org/dpv/risk#InGroupBiashttps://w3id.org/dpv/risk#NationalityDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias + Broader/Parent types risk:Discriminationrisk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when showing partiality to one's own group or own characteristicsDiscrimination based on a person's nationality or citizenship
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11229,23 +18575,23 @@

    Injury

    - + - + + + + - - - - + - + @@ -11259,7 +18605,7 @@

    Injury

    - @@ -11268,65 +18614,41 @@

    Injury

    -
    -

    None

    + + + +
    +

    Non-Normality Bias

    TermInjuryNonMaterialDamage Prefix risk
    LabelInjuryNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:LegalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes InjurySomething that acts as or causes Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - - - - - @@ -11337,24 +18659,36 @@

    None

    - + + + + - + + + + - + + + + - + + + + - @@ -11362,44 +18696,47 @@

    None

    -
    -

    Integrity Incident

    + + + + +
    +

    Non-Response Bias

    TermIntegrityBreachNonNormalityBias Prefix risk
    LabelNoneNon-Normality Bias
    IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#NonNormalityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11408,28 +18745,34 @@

    Integrity Incident

    - + - + + + + - + - + + + + - @@ -11438,36 +18781,37 @@

    Integrity Incident

    -
    -

    Intentional Misuse

    + + +
    +

    Operational Security Risk

    TermIntegrityIncidentNonResponseBias Prefix risk
    LabelIntegrity IncidentNon-Response Bias
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#NonResponseBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the integrity of information or system has been affectedBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11480,7 +18824,7 @@

    Intentional Misuse

    - + @@ -11498,7 +18842,7 @@

    Intentional Misuse

    - @@ -11507,39 +18851,40 @@

    Intentional Misuse

    -
    -

    Intercept Communications

    + + + +
    +

    Out-Group Homogeneity Bias

    TermIntentionalMisuseOperationalSecurityRisk Prefix risk
    LabelIntentional MisuseOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionIntentional MisuseRisks and issues that arise during operational processes
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -11552,40 +18897,34 @@

    Intercept Communications

    - + - - - - + - + - + - - - - + - + - @@ -11597,36 +18936,36 @@

    Intercept Communications

    - -
    -

    Judicial Costs

    +
    +

    Payment

    TermInterceptCommunicationsOutGroupHomogeneityBias Prefix risk
    LabelIntercept CommunicationsOut-Group Homogeneity Bias
    IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionSomething that acts as or causes Interception of CommunicationsBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11640,7 +18979,7 @@

    Judicial Costs

    - + @@ -11651,14 +18990,23 @@

    Judicial Costs

    - - - + + + + + + + + + + + + - @@ -11667,35 +19015,38 @@

    Judicial Costs

    -
    -

    Judicial Penalty

    + + + +
    +

    Personal Safety Endangerment

    TermJudicialCostsPayment Prefix risk
    LabelJudicial CostsPayment
    IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:Renumeration + → risk:FinancialImpactdpv:RiskConcept
    DefinitionSomething that involves or causes judicial costs to be paidSomething that acts as or provides payment e.g. to access a service or purchase resources
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11709,25 +19060,37 @@

    Judicial Penalty

    - + - - - - + + + + - + + + + + + + + + + + + + - @@ -11736,35 +19099,41 @@

    Judicial Penalty

    -
    -

    Legal Risk

    + + + + +
    +

    Phishing Scam

    TermJudicialPenaltyPersonalSafetyEndangerment Prefix risk
    LabelJudicial PenaltyPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that involves or causes judicial penalties to be paidSomething that acts as or causes Personal Safety Endangerment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11777,25 +19146,37 @@

    Legal Risk

    - + - + + + + - - - + + + + + + + + + + + + - @@ -11804,36 +19185,39 @@

    Legal Risk

    -
    -

    Lose of Credibility

    + + + +
    +

    Physical Assault

    TermLegalRiskPhishingScam Prefix risk
    LabelLegal RiskPhishing Scam
    IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionRisks and issues that have their basis in legal requirements and enforcementSomething that acts as or causes Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11846,7 +19230,7 @@

    Lose of Credibility

    - + @@ -11876,7 +19260,7 @@

    Lose of Credibility

    - @@ -11885,36 +19269,39 @@

    Lose of Credibility

    -
    -

    Lose of Customer Confidence

    + + + +
    +

    Physical Harm

    TermLoseCredibilityPhysicalAssault Prefix risk
    LabelLose of CredibilityPhysical Assault
    IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of CredibilitySomething that acts as or causes Physical Assault
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -11925,39 +19312,24 @@

    Lose of Customer Confidence

    - - - - + - - - - + - - - - - - - - - - - - + + + - @@ -11965,37 +19337,35 @@

    Lose of Customer Confidence

    - -
    -

    Lose of Goodwill

    +
    +

    Potential Consequence

    TermLoseCustomerConfidencePhysicalHarm Prefix risk
    LabelLose of Customer ConfidencePhysical Harm
    IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -12008,28 +19378,25 @@

    Lose of Goodwill

    - + - + + + + - - - - + - + - - - - + @@ -12038,7 +19405,7 @@

    Lose of Goodwill

    - @@ -12046,37 +19413,35 @@

    Lose of Goodwill

    - -
    -

    Lose of Negotiating Capacity

    +
    +

    Potential Impact

    TermLoseGoodwillPotentialConsequence Prefix risk
    LabelLose of GoodwillPotential Consequence
    IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#PotentialConsequence
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of GoodwillIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12089,28 +19454,25 @@

    Lose of Negotiating Capacity

    - + - + + + + - - - - + - + - - - - + @@ -12119,7 +19481,7 @@

    Lose of Negotiating Capacity

    - @@ -12127,37 +19489,35 @@

    Lose of Negotiating Capacity

    - -
    -

    Lose of Opportunity

    +
    +

    Potential Risk

    TermLoseNegotiatingCapacityPotentialImpact Prefix risk
    LabelLose of Negotiating CapacityPotential Impact
    IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#PotentialImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Negotiating CapacityIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12170,28 +19530,25 @@

    Lose of Opportunity

    - + - + + + + - - - - + - + - - - - + @@ -12200,7 +19557,7 @@

    Lose of Opportunity

    - @@ -12208,37 +19565,35 @@

    Lose of Opportunity

    - -
    -

    Lose of Reputation

    +
    +

    Potential RiskSource

    TermLoseOpportunityPotentialRisk Prefix risk
    LabelLose of OpportunityPotential Risk
    IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#PotentialRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of OpportunityIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12251,28 +19606,25 @@

    Lose of Reputation

    - + - + + + + - - - - + - + - - - - + @@ -12281,7 +19633,7 @@

    Lose of Reputation

    - @@ -12290,36 +19642,38 @@

    Lose of Reputation

    -
    -

    Lose of Trust

    + + + +
    +

    Privacy

    TermLoseReputationPotentialRiskSource Prefix risk
    LabelLose of ReputationPotential RiskSource
    IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#PotentialRiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of ReputationIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -12330,39 +19684,24 @@

    Lose of Trust

    - - - - + - - - - + - - - - - - - - - - - - - + + + + - @@ -12371,52 +19710,43 @@

    Lose of Trust

    -
    -

    Low Likelihood

    + + + +
    +

    Psychological Harm

    TermLoseTrustPrivacy Prefix risk
    LabelLose of TrustPrivacy
    IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#Privacy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:IndividualRisk
    DefinitionSomething that acts as or causes Loss of Trust
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -12425,25 +19755,28 @@

    Low Likelihood

    - + - - - - + - + + + + - + - + + + + @@ -12452,7 +19785,7 @@

    Low Likelihood

    - @@ -12461,52 +19794,42 @@

    Low Likelihood

    -
    -

    Low Risk

    + + +
    +

    Public Order Breach

    TermLowLikelihoodPsychologicalHarm Prefix risk
    LabelLow LikelihoodPsychological Harm
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#PsychologicalHarm
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:Harm + → risk:IndividualRisk
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is LowSomething that acts as or causes Psychological Harm
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -12515,25 +19838,28 @@

    Low Risk

    - + - - - - + - + + + + - + - + + + + @@ -12542,7 +19868,7 @@

    Low Risk

    - @@ -12551,52 +19877,50 @@

    Low Risk

    -
    -

    Low Severity

    + + + +
    +

    Racial Discrimination

    TermLowRiskPublicOrderBreach Prefix risk
    LabelLow RiskPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is LowSomething that acts as or causes Public Order Breach
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + @@ -12605,12 +19929,9 @@

    Low Severity

    - + - - - - + @@ -12621,18 +19942,15 @@

    Low Severity

    - + - - - - + - @@ -12641,45 +19959,44 @@

    Low Severity

    -
    -

    Malicious Code Attack

    + + + +
    +

    Racism

    TermLowSeverityRacialDiscrimination Prefix risk
    LabelLow SeverityRacial Discrimination
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#RacialDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:Racism + → risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Racism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is LowDiscrimination against individuals because of their racial background or skin color
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - @@ -12692,37 +20009,28 @@

    Malicious Code Attack

    - + - - - - + - + - - - - - - - - + + - @@ -12731,49 +20039,47 @@

    Malicious Code Attack

    -
    -

    Malware Attack

    +
    +

    Recovery Control

    TermMaliciousCodeAttackRacism Prefix risk
    LabelMalicious Code AttackRacism
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#Racism
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:ExternalSecurityThreat + risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes Malicious Code AttackPrejudice or discrimination against people based on their race
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + + + + @@ -12782,37 +20088,28 @@

    Malware Attack

    - + - - - - + - + - - - - - - - - + + - @@ -12821,40 +20118,48 @@

    Malware Attack

    -
    -

    Material Damage

    +
    +

    Reduce Likelihood

    TermMalwareAttackRecoveryControl Prefix risk
    LabelMalware AttackRecovery Control
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#RecoveryControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malware AttackControl to recover from event
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -12863,12 +20168,9 @@

    Material Damage

    - + - - - - + @@ -12879,12 +20181,9 @@

    Material Damage

    - + - - - - + @@ -12893,7 +20192,7 @@

    Material Damage

    - @@ -12902,40 +20201,48 @@

    Material Damage

    -
    -

    Misuse

    +
    +

    Reduce Severity

    TermMaterialDamageReduceLikelihood Prefix risk
    LabelMaterial DamageReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Material DamageControl that reduces the likelihood of an event
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -12944,7 +20251,7 @@

    Misuse

    - + @@ -12957,21 +20264,18 @@

    Misuse

    - + - - - - + - + - @@ -12980,50 +20284,45 @@

    Misuse

    -
    -

    Moderate Likelihood

    +
    +

    Reduction Control

    TermMisuseReduceSeverity Prefix risk
    LabelMisuseReduce Severity
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#ReduceSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes MisuseControl that reduces the severity of an event
    Date Created2024-06-112024-05-19
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -13034,12 +20333,9 @@

    Moderate Likelihood

    - + - - - - + @@ -13050,18 +20346,15 @@

    Moderate Likelihood

    - + - - - - + - @@ -13070,52 +20363,46 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    + + + + + + +
    +

    Re-identification

    TermModerateLikelihoodReductionControl Prefix risk
    LabelModerate LikelihoodReduction Control
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#ReductionControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is ModerateControl that reduces the likelihood or severity of an event
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - - - - + @@ -13124,11 +20411,11 @@

    Moderate Risk

    - + - + @@ -13140,9 +20427,12 @@

    Moderate Risk

    - + - + + + + @@ -13151,7 +20441,7 @@

    Moderate Risk

    - @@ -13160,52 +20450,48 @@

    Moderate Risk

    -
    -

    Moderate Severity

    + + + +
    +

    Religious Discrimination

    TermModerateRiskReidentification Prefix risk
    LabelModerate RiskRe-identification
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:OperationalSecurityRisk + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateSomething that acts as or causes Re-identification
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-182022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - + @@ -13214,12 +20500,9 @@

    Moderate Severity

    - + - - - - + @@ -13230,18 +20513,15 @@

    Moderate Severity

    - + - - - - + - @@ -13250,23 +20530,23 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    +
    +

    Remedy Control

    TermModerateSeverityReligiousDiscrimination Prefix risk
    LabelModerate SeverityReligious Discrimination
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#ReligiousDiscrimination
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity + risk:Discrimination + → risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is ModerateDiscrimination based on a person's religious beliefs or practices
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -13278,8 +20558,7 @@

    Monitor Consequence

    - @@ -13300,7 +20579,7 @@

    Monitor Consequence

    - + @@ -13316,10 +20595,7 @@

    Monitor Consequence

    - - - - + @@ -13333,23 +20609,23 @@

    Monitor Consequence

    -
    -

    Monitor Control

    +
    +

    Remove Consequence

    TermMonitorConsequenceRemedyControl Prefix risk
    LabelMonitor ConsequenceRemedy Control
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#RemedyControl
    Broader/Parent types risk:MonitorControl - → risk:RiskControl + risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionControl that monitors a Risk ConsequenceControl to remedy consequences of event
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -13361,7 +20637,8 @@

    Monitor Control

    - @@ -13382,12 +20659,9 @@

    Monitor Control

    - + - - - - + @@ -13418,23 +20692,23 @@

    Monitor Control

    -
    -

    Monitor Impact

    +
    +

    Remove Impact

    TermMonitorControlRemoveConsequence Prefix risk
    LabelMonitor ControlRemove Consequence
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#RemoveConsequence
    Broader/Parent types risk:RiskControl + risk:ConsequenceControl + → risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsControl that removes Consequence i.e. prevents it from materialising
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    - + - + - + @@ -13446,7 +20720,7 @@

    Monitor Impact

    - - + @@ -13501,23 +20775,23 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Remove Source

    TermMonitorImpactRemoveImpact Prefix risk
    LabelMonitor ImpactRemove Impact
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#RemoveImpact
    Broader/Parent types risk:MonitorControl + risk:ImpactControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13468,7 +20742,7 @@

    Monitor Impact

    DefinitionControl that monitors a Risk ImpactControl that removes Impact i.e. prevents it from materialising
    - + - + - + @@ -13529,7 +20803,7 @@

    Monitor Risk

    - - + @@ -13584,48 +20858,43 @@

    Monitor Risk

    -
    -

    Monitor Control

    + + + +
    +

    Remuneration

    TermMonitorRiskRemoveSource Prefix risk
    LabelMonitor RiskRemove Source
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#RemoveSource
    Broader/Parent types risk:MonitorControl + risk:SourceControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13551,7 +20825,7 @@

    Monitor Risk

    DefinitionControl that monitors a RiskControl that removes the risk source
    - + - + - + - + - - - - - + @@ -13634,7 +20903,7 @@

    Monitor Control

    - + @@ -13647,18 +20916,21 @@

    Monitor Control

    - + - + + + + - + - @@ -13667,48 +20939,42 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    + + + +
    +

    Reputational Risk

    TermMonitorRiskControlRenumeration Prefix risk
    LabelMonitor ControlRemuneration
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlSomething that acts as or provides renumeration which is in monetary or financial form
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13717,7 +20983,7 @@

    Monitor Risk Source

    - + @@ -13728,20 +20994,14 @@

    Monitor Risk Source

    - - - - + - - - - + - @@ -13750,48 +21010,44 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    + + + +
    +

    Requirements Bias

    TermMonitorRiskSourceReputationalRisk Prefix risk
    LabelMonitor Risk SourceReputational Risk
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceRisks and issues that affect the reputation of the organisation
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13800,31 +21056,37 @@

    Monitor Vulnerabilities

    - + - + + + + - + + + + - + - + - @@ -13833,35 +21095,43 @@

    Monitor Vulnerabilities

    -
    -

    Non-Material Damage

    + + + +
    +

    Reverse Discrimination

    TermMonitorVulnerabilitiesRequirementsBias Prefix risk
    LabelMonitor VulnerabilitiesRequirements Bias
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#RequirementsBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk VulnerabilityBias that occurs in or during requirements creation
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -13875,12 +21145,9 @@

    Non-Material Damage

    - + - - - - + @@ -13891,21 +21158,15 @@

    Non-Material Damage

    - + - - - - - - - - + + - @@ -13914,38 +21175,40 @@

    Non-Material Damage

    -
    -

    Non-Normality Bias

    + + + +
    +

    Reward

    TermNonMaterialDamageReverseDiscrimination Prefix risk
    LabelNon-Material DamageReverse Discrimination
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#ReverseDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -13958,34 +21221,34 @@

    Non-Normality Bias

    - + - - - - + - + - + + + + - + - @@ -13994,39 +21257,40 @@

    Non-Normality Bias

    -
    -

    Non-Response Bias

    + + + +
    +

    Erosion of Rights

    TermNonNormalityBiasReward Prefix risk
    LabelNon-Normality BiasReward
    IRIhttps://w3id.org/dpv/risk#NonNormalityBiashttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:Renumeration + → risk:FinancialImpact + → dpv:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleadingSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Source
    Date Created2024-09-132024-04-14
    Date Modified2024-08-16
    ContributorsDaniel DohertyGeorg P. Krog, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14039,34 +21303,28 @@

    Non-Response Bias

    - + - + + + + - - - - + - - - - + - - - - + - @@ -14075,35 +21333,40 @@

    Non-Response Bias

    -
    -

    Operational Security Risk

    + + + +
    +

    Obstruction of Rights

    TermNonResponseBiasRightEroded Prefix risk
    LabelNon-Response BiasErosion of Rights
    IRIhttps://w3id.org/dpv/risk#NonResponseBiashttps://w3id.org/dpv/risk#RightEroded
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation biasThe gradual weakening or reduction of the scope and protection of rights
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14116,9 +21379,12 @@

    Operational Security Risk

    - + - + + + + @@ -14134,7 +21400,7 @@

    Operational Security Risk

    - @@ -14143,37 +21409,40 @@

    Operational Security Risk

    -
    -

    Out-Group Homogeneity Bias

    + + + +
    +

    Denial of Rights

    TermOperationalSecurityRiskRightObstructed Prefix risk
    LabelOperational Security RiskObstruction of Rights
    IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#RightObstructed
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionRisks and issues that arise during operational processesInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14186,34 +21455,28 @@

    Out-Group Homogeneity Bias

    - + - + + + + - - - - + - - - - + - - - - + - @@ -14222,35 +21485,39 @@

    Out-Group Homogeneity Bias

    -
    -

    Payment

    + + + +
    +

    Prevent Exercising of Rights

    TermOutGroupHomogeneityBiasRightsDenial Prefix risk
    LabelOut-Group Homogeneity BiasDenial of Rights
    IRIhttps://w3id.org/dpv/risk#OutGroupHomogeneityBiashttps://w3id.org/dpv/risk#RightsDenial
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristicsThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14264,9 +21531,12 @@

    Payment

    - + - + + + + @@ -14277,7 +21547,7 @@

    Payment

    - + @@ -14291,7 +21561,7 @@

    Payment

    - @@ -14300,30 +21570,33 @@

    Payment

    -
    -

    Personal Safety Endangerment

    + + + +
    +

    Impact to Rights

    TermPaymentRightsExercisePrevention Prefix risk
    LabelPaymentPrevent Exercising of Rights
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#RightsExercisePrevention
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:FinancialImpact + risk:RightsImpact + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-04-142022-08-18
    Date Modified
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + @@ -14342,9 +21615,12 @@

    Personal Safety Endangerment

    - + - + + + + @@ -14372,7 +21648,7 @@

    Personal Safety Endangerment

    - @@ -14381,38 +21657,39 @@

    Personal Safety Endangerment

    -
    -

    Phishing Scam

    + + + +
    +

    Limitation of Rights

    TermPersonalSafetyEndangermentRightsImpact Prefix risk
    LabelPersonal Safety EndangermentImpact to Rights
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    DefinitionSomething that acts as or causes Personal Safety EndangermentSomething that acts as or causes Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -14426,23 +21703,23 @@

    Phishing Scam

    - + - + + + + - - - - + - + @@ -14450,13 +21727,13 @@

    Phishing Scam

    - + - @@ -14465,35 +21742,40 @@

    Phishing Scam

    -
    -

    Physical Assault

    + + + +
    +

    Unfulfilment of Rights

    TermPhishingScamRightsLimitation Prefix risk
    LabelPhishing ScamLimitation of Rights
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#RightsLimitation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:RightsImpact + → risk:SocietalRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes Phishing ScamA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172022-08-18
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14506,37 +21788,28 @@

    Physical Assault

    - + - + + + + - - - - + - - - - - - - - - - - - + + + - @@ -14545,35 +21818,40 @@

    Physical Assault

    -
    -

    Physical Harm

    + + + +
    +

    Violation of Rights

    TermPhysicalAssaultRightsUnfulfilled Prefix risk
    LabelPhysical AssaultUnfulfilment of Rights
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#RightsUnfulfilled
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Physical AssaultFailure to meet or complete the fulfilment of rights
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -14584,8 +21862,14 @@

    Physical Harm

    - - + + + + + + + + @@ -14594,51 +21878,64 @@

    Physical Harm

    - - - + + + + + + + + + + + + -
    TermPhysicalHarmRightsViolation Prefix risk
    LabelPhysical HarmViolation of Rights
    IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#RightsViolation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + risk:RightsImpact + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    + + + + - -
    -

    Privacy

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -14649,24 +21946,36 @@

    Privacy

    - + + + + - + + + + - + + + + - + + + + - @@ -14674,36 +21983,35 @@

    Privacy

    - -
    -

    Psychological Harm

    +
    +

    Risk Assessment

    TermPrivacyRiskAnalysis Prefix risk
    LabelPrivacyRisk Analysis
    IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IndividualRisk + risk:RiskAssessment + → risk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - @@ -14716,7 +22024,7 @@

    Psychological Harm

    - + @@ -14725,28 +22033,22 @@

    Psychological Harm

    - + - + - - - - - - - - + + - @@ -14754,41 +22056,46 @@

    Psychological Harm

    - -
    -

    Public Order Breach

    +
    +

    Risk Control

    TermPsychologicalHarmRiskAssessment Prefix risk
    LabelPsychological HarmRisk Assessment
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:IndividualRisk + risk:RiskManagement
    DefinitionSomething that acts as or causes Psychological HarmAssessment of risk involving its identification, analysis, and evaluation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -14797,37 +22104,31 @@

    Public Order Breach

    - + + + + - - - - + - - - - - - - - - - - + + + + + - @@ -14835,48 +22136,36 @@

    Public Order Breach

    - -
    -

    Recovery Control

    +
    +

    Risk Management

    TermPublicOrderBreachRiskControl Prefix risk
    LabelPublic Order BreachRisk Control
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Public Order BreachControl that modifies risk
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Date Created2024-05-19
    See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in DEX
    - + - + - + - + - - - + - - - - + @@ -14885,20 +22174,23 @@

    Recovery Control

    - + - + + + + - + @@ -14906,7 +22198,7 @@

    Recovery Control

    - @@ -14915,48 +22207,40 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Risk Matrix

    TermRecoveryControlRiskManagement Prefix risk
    LabelRecovery ControlRisk Management
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RiskManagement
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure -
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to recover from eventSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Source
    Date Created2024-05-192024-06-12
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -14965,20 +22249,23 @@

    Reduce Likelihood

    - + - + + + + - + @@ -14989,7 +22276,7 @@

    Reduce Likelihood

    - @@ -14998,48 +22285,41 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    +
    +

    Risk Matrix 3x3

    TermReduceLikelihoodRiskMatrix Prefix risk
    LabelReduce LikelihoodRisk Matrix
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood of an eventCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    SourceIEC 31010:2019
    Date Created2024-05-192024-02-14
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -15048,7 +22328,7 @@

    Reduce Severity

    - + @@ -15061,7 +22341,7 @@

    Reduce Severity

    - + @@ -15072,7 +22352,7 @@

    Reduce Severity

    - @@ -15081,47 +22361,41 @@

    Reduce Severity

    -
    -

    Reduction Control

    +
    +

    Risk Matrix 5x5

    TermReduceSeverityRiskMatrix3x3 Prefix risk
    LabelReduce SeverityRisk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#RiskMatrix3x3
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an eventA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15130,7 +22404,7 @@

    Reduction Control

    - + @@ -15143,15 +22417,18 @@

    Reduction Control

    - + - + + + + - @@ -15160,41 +22437,37 @@

    Reduction Control

    - - -
    -

    Re-identification

    +
    +

    Risk Matrix 7x7

    TermReductionControlRiskMatrix5x5 Prefix risk
    LabelReduction ControlRisk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#RiskMatrix5x5
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - @@ -15207,12 +22480,9 @@

    Re-identification

    - + - - - - + @@ -15223,12 +22493,9 @@

    Re-identification

    - + - - - - + @@ -15237,7 +22504,7 @@

    Re-identification

    - @@ -15245,46 +22512,41 @@

    Re-identification

    - -
    -

    Remedy Control

    +
    +

    Risk Source

    TermReidentificationRiskMatrix7x7 Prefix risk
    LabelRe-identificationRisk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#RiskMatrix7x7
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Re-identificationA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - @@ -15295,7 +22557,7 @@

    Remedy Control

    - + @@ -15308,15 +22570,18 @@

    Remedy Control

    - + - + + + + - @@ -15325,48 +22590,42 @@

    Remedy Control

    -
    -

    Remove Consequence

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    TermRemedyControlRiskSource Prefix risk
    LabelRemedy ControlRisk Source
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasRiskSource
    DefinitionControl to remedy consequences of eventThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Date Created2024-05-192024-02-14
    Date Modified2024-08-16
    See More: section RISK-CONTROLS in RISK + section CORE in RISK
    - + - + - + - + - - - - - + @@ -15375,7 +22634,7 @@

    Remove Consequence

    - + @@ -15388,7 +22647,7 @@

    Remove Consequence

    - + @@ -15399,7 +22658,7 @@

    Remove Consequence

    - @@ -15407,49 +22666,43 @@

    Remove Consequence

    - -
    -

    Remove Impact

    + +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRemoveConsequenceRM3x3S1L1 Prefix risk
    LabelRemove ConsequenceLow Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#RM3x3S1L1
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Consequence i.e. prevents it from materialisingNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15458,7 +22711,7 @@

    Remove Impact

    - + @@ -15471,7 +22724,7 @@

    Remove Impact

    - + @@ -15482,7 +22735,7 @@

    Remove Impact

    - @@ -15491,48 +22744,42 @@

    Remove Impact

    -
    -

    Remove Source

    +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRemoveImpactRM3x3S1L2 Prefix risk
    LabelRemove ImpactLow Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RM3x3S1L2
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Impact i.e. prevents it from materialisingNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -15541,7 +22788,7 @@

    Remove Source

    - + @@ -15554,7 +22801,7 @@

    Remove Source

    - + @@ -15565,7 +22812,7 @@

    Remove Source

    - @@ -15574,36 +22821,38 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRemoveSourceRM3x3S1L3 Prefix risk
    LabelRemove SourceModerate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RM3x3S1L3
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    Date Created2024-05-192022-08-17
    See More: section RISK-CONTROLS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15616,7 +22865,7 @@

    Remuneration

    - + @@ -15629,21 +22878,18 @@

    Remuneration

    - + - - - - + - + - @@ -15652,35 +22898,38 @@

    Remuneration

    -
    -

    Reputational Risk

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRenumerationRM3x3S2L1 Prefix risk
    LabelRemunerationLow Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RM3x3S2L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    Date Created2024-04-142022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15693,7 +22942,7 @@

    Reputational Risk

    - + @@ -15704,14 +22953,20 @@

    Reputational Risk

    - + + + + - + + + + - @@ -15720,37 +22975,38 @@

    Reputational Risk

    -
    -

    Requirements Bias

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermReputationalRiskRM3x3S2L2 Prefix risk
    LabelReputational RiskModerate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RM3x3S2L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionRisks and issues that affect the reputation of the organisationNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15763,37 +23019,31 @@

    Requirements Bias

    - + - - - - + - - - - + - + - + - @@ -15802,36 +23052,38 @@

    Requirements Bias

    -
    -

    Reward

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRequirementsBiasRM3x3S2L3 Prefix risk
    LabelRequirements BiasHigh Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RequirementsBiashttps://w3id.org/dpv/risk#RM3x3S2L3
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionBias that occurs in or during requirements creationNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2024-09-132022-08-17
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15844,7 +23096,7 @@

    Reward

    - + @@ -15857,21 +23109,18 @@

    Reward

    - + - - - - + - + - @@ -15880,36 +23129,38 @@

    Reward

    -
    -

    Prevent Exercising of Rights

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRewardRM3x3S3L1 Prefix risk
    LabelRewardModerate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RM3x3S3L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    Date Created2024-04-142022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -15922,12 +23173,9 @@

    Prevent Exercising of Rights

    - + - - - - + @@ -15938,21 +23186,18 @@

    Prevent Exercising of Rights

    - + - - - - + - + - @@ -15961,50 +23206,42 @@

    Prevent Exercising of Rights

    -
    -

    Impact to Rights

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRightsExercisePreventionRM3x3S3L2 Prefix risk
    LabelPrevent Exercising of RightsHigh Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RM3x3S3L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Prevent Exercising of RightsNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - - - + @@ -16013,20 +23250,14 @@

    Impact to Rights

    - + - - - - + - - - - + @@ -16034,10 +23265,7 @@

    Impact to Rights

    - - - - + @@ -16046,7 +23274,7 @@

    Impact to Rights

    - @@ -16055,36 +23283,38 @@

    Impact to Rights

    -
    -

    Limitation of Rights

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRightsImpactRM3x3S3L3 Prefix risk
    LabelImpact to RightsHigh Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RM3x3S3L3
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:Impact - → dpv:Consequence - → dpv:RiskConcept -
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasConsequence, - dpv:hasImpact -
    DefinitionSomething that acts as or causes Impact to RightsNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16097,12 +23327,9 @@

    Limitation of Rights

    - + - - - - + @@ -16113,21 +23340,18 @@

    Limitation of Rights

    - + - - - - + - + - @@ -16136,36 +23360,38 @@

    Limitation of Rights

    -
    -

    Violation of Rights

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRightsLimitationRM5x5S1L1 Prefix risk
    LabelLimitation of RightsVery Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RM5x5S1L1
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Limitation of RightsNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16178,12 +23404,9 @@

    Violation of Rights

    - + - - - - + @@ -16194,61 +23417,57 @@

    Violation of Rights

    - + - - - - + - + -
    TermRightsViolationRM5x5S1L2 Prefix risk
    LabelViolation of RightsVery Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RM5x5S1L2
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Violation of RightsNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-MATRIX in RISK
    - - - - -
    -

    Risk Analysis

    + +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    - + - + - + - + - @@ -16262,23 +23481,20 @@

    Risk Analysis

    - + - - - - + - + @@ -16289,7 +23505,7 @@

    Risk Analysis

    - @@ -16297,35 +23513,39 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRiskAnalysisRM5x5S1L3 Prefix risk
    LabelRisk AnalysisVery Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RM5x5S1L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    SourceIEC 31010:2019
    Date Created2022-08-182022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16338,31 +23558,31 @@

    Risk Assessment

    - + - - - - + - + - + + + + - @@ -16370,46 +23590,43 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRiskAssessmentRM5x5S1L4 Prefix risk
    LabelRisk AssessmentLow Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RM5x5S1L4
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskManagement + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionAssessment of risk involving its identification, analysis, and evaluationNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    Source
    Date Created2024-02-142022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -16418,13 +23635,10 @@

    Risk Control

    - + - - - @@ -16434,15 +23648,18 @@

    Risk Control

    - + - + + + + - @@ -16450,33 +23667,40 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRiskControlRM5x5S1L5 Prefix risk
    LabelRisk ControlLow Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RM5x5S1L5
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that modifies riskNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
    - + - + - + - + - + + + @@ -16488,31 +23712,31 @@

    Risk Management

    - + - - - - + - + - + + + + - @@ -16521,35 +23745,37 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRiskManagementRM5x5S2L1 Prefix risk
    LabelRisk ManagementVery Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RM5x5S2L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    Source
    Date Created2024-06-122022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -16563,23 +23789,20 @@

    Risk Matrix

    - + - - - - + - + @@ -16590,7 +23813,7 @@

    Risk Matrix

    - @@ -16599,23 +23822,23 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRiskMatrixRM5x5S2L2 Prefix risk
    LabelRisk MatrixLow Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM5x5S2L2
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -16627,7 +23850,8 @@

    Risk Matrix 3x3

    - @@ -16642,7 +23866,7 @@

    Risk Matrix 3x3

    - + @@ -16675,23 +23899,23 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRiskMatrix3x3RM5x5S2L3 Prefix risk
    LabelRisk Matrix 3x3Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM5x5S2L3
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -16703,7 +23927,8 @@

    Risk Matrix 5x5

    - @@ -16718,7 +23943,7 @@

    Risk Matrix 5x5

    - + @@ -16751,23 +23976,23 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRiskMatrix5x5RM5x5S2L4 Prefix risk
    LabelRisk Matrix 5x5Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM5x5S2L4
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -16779,7 +24004,8 @@

    Risk Matrix 7x7

    - @@ -16794,7 +24020,7 @@

    Risk Matrix 7x7

    - + @@ -16826,43 +24052,43 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    + +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRiskMatrix7x7RM5x5S2L5 Prefix risk
    LabelRisk Matrix 7x7High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM5x5S2L5
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix5x5 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + - + - - - - - + @@ -16871,7 +24097,7 @@

    Risk Source

    - + @@ -16884,18 +24110,18 @@

    Risk Source

    - + + - - - - + + + - @@ -16904,23 +24130,23 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRiskSourceRM5x5S3L1 Prefix risk
    LabelRisk SourceVery Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM5x5S3L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix5x5 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -16932,7 +24158,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - - + @@ -16981,23 +24207,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM3x3S1L1RM5x5S3L2 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM5x5S3L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16948,7 +24174,7 @@

    Low Risk (RM3x3 S:1 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -17009,7 +24235,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - - + @@ -17058,23 +24284,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM3x3S1L2RM5x5S3L3 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM5x5S3L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17025,7 +24251,7 @@

    Low Risk (RM3x3 S:1 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -17086,7 +24312,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - - + @@ -17135,23 +24361,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM3x3S1L3RM5x5S3L4 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM5x5S3L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17102,7 +24328,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -17163,7 +24389,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - - + @@ -17212,23 +24438,23 @@

    Low Risk (RM3x3 S:2 L:1)

    -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM3x3S2L1RM5x5S3L5 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM5x5S3L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17179,7 +24405,7 @@

    Low Risk (RM3x3 S:2 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -17240,7 +24466,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + @@ -17289,23 +24515,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM3x3S2L2RM5x5S4L1 Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S4L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17256,7 +24482,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -17317,7 +24543,7 @@

    High Risk (RM3x3 S:2 L:3)

    - - + @@ -17366,23 +24592,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM3x3S2L3RM5x5S4L2 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S4L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17333,7 +24559,7 @@

    High Risk (RM3x3 S:2 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -17394,7 +24620,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - + @@ -17443,23 +24669,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM3x3S3L1RM5x5S4L3 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S4L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17410,7 +24636,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -17471,7 +24697,7 @@

    High Risk (RM3x3 S:3 L:2)

    - - + @@ -17520,23 +24746,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM3x3S3L2RM5x5S4L4 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S4L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17487,7 +24713,7 @@

    High Risk (RM3x3 S:3 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -17548,7 +24774,7 @@

    High Risk (RM3x3 S:3 L:3)

    - - + @@ -17597,23 +24823,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM3x3S3L3RM5x5S4L5 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S4L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17564,7 +24790,7 @@

    High Risk (RM3x3 S:3 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -17641,7 +24867,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -17674,23 +24900,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM5x5S1L1RM5x5S5L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S5L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -17718,7 +24944,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -17751,23 +24977,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM5x5S1L2RM5x5S5L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S5L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -17795,7 +25021,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -17828,23 +25054,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM5x5S1L3RM5x5S5L3 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S5L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -17872,7 +25098,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - + @@ -17905,23 +25131,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM5x5S1L4RM5x5S5L4 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S5L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -17949,7 +25175,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - + @@ -17982,23 +25208,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM5x5S1L5RM5x5S5L5 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S5L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -18010,7 +25236,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - - + @@ -18059,23 +25285,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM5x5S2L1RM7x7S1L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM7x7S1L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18026,7 +25252,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -18087,7 +25313,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - - + @@ -18136,23 +25362,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM5x5S2L2RM7x7S1L2 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM7x7S1L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18103,7 +25329,7 @@

    Low Risk (RM5x5 S:2 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -18164,7 +25390,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - - + @@ -18213,23 +25439,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM5x5S2L3RM7x7S1L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM7x7S1L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18180,7 +25406,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -18241,7 +25467,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - - + @@ -18290,23 +25516,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM5x5S2L4RM7x7S1L4 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM7x7S1L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18257,7 +25483,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -18318,7 +25544,7 @@

    High Risk (RM5x5 S:2 L:5)

    - - + @@ -18367,23 +25593,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM5x5S2L5RM7x7S1L5 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM7x7S1L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18334,7 +25560,7 @@

    High Risk (RM5x5 S:2 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + - + @@ -18395,7 +25621,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - - + @@ -18444,23 +25670,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM5x5S3L1RM7x7S1L6 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM7x7S1L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18411,7 +25637,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -18472,7 +25698,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - - + @@ -18521,23 +25747,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM5x5S3L2RM7x7S1L7 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM7x7S1L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18488,7 +25714,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -18549,7 +25775,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - - + @@ -18598,23 +25824,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM5x5S3L3RM7x7S2L1 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM7x7S2L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18565,7 +25791,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -18626,7 +25852,7 @@

    High Risk (RM5x5 S:3 L:4)

    - - + @@ -18675,23 +25901,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM5x5S3L4RM7x7S2L2 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM7x7S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18642,7 +25868,7 @@

    High Risk (RM5x5 S:3 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -18703,7 +25929,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - - + @@ -18752,23 +25978,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM5x5S3L5RM7x7S2L3 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM7x7S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18719,7 +25945,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -18780,7 +26006,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - - + @@ -18829,23 +26055,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM5x5S4L1RM7x7S2L4 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM7x7S2L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18796,7 +26022,7 @@

    Low Risk (RM5x5 S:4 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -18857,7 +26083,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - - + @@ -18906,23 +26132,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM5x5S4L2RM7x7S2L5 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM7x7S2L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18873,7 +26099,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -18934,7 +26160,7 @@

    High Risk (RM5x5 S:4 L:3)

    - - + @@ -18983,23 +26209,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM5x5S4L3RM7x7S2L6 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM7x7S2L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18950,7 +26176,7 @@

    High Risk (RM5x5 S:4 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -19011,7 +26237,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - - + @@ -19060,23 +26286,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM5x5S4L4RM7x7S2L7 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM7x7S2L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19027,7 +26253,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -19088,7 +26314,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - - + @@ -19137,23 +26363,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM5x5S4L5RM7x7S3L1 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM7x7S3L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19104,7 +26330,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -19165,7 +26391,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - - + @@ -19214,23 +26440,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM5x5S5L1RM7x7S3L2 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S3L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19181,7 +26407,7 @@

    Low Risk (RM5x5 S:5 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -19242,7 +26468,7 @@

    High Risk (RM5x5 S:5 L:2)

    - - + @@ -19291,23 +26517,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM5x5S5L2RM7x7S3L3 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S3L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19258,7 +26484,7 @@

    High Risk (RM5x5 S:5 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -19319,7 +26545,7 @@

    High Risk (RM5x5 S:5 L:3)

    - - + @@ -19368,23 +26594,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM5x5S5L3RM7x7S3L4 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S3L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19335,7 +26561,7 @@

    High Risk (RM5x5 S:5 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -19396,7 +26622,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - - + @@ -19445,23 +26671,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM5x5S5L4RM7x7S3L5 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S3L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19412,7 +26638,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -19473,7 +26699,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - - + @@ -19522,23 +26748,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM5x5S5L5RM7x7S3L6 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S3L6
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -19489,7 +26715,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -19566,7 +26792,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - + @@ -19599,23 +26825,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S1L1RM7x7S3L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -19643,7 +26869,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - + @@ -19676,23 +26902,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S1L2RM7x7S4L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -19720,7 +26946,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - + @@ -19753,23 +26979,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S1L3RM7x7S4L2 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -19797,7 +27023,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - + @@ -19830,23 +27056,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S1L4RM7x7S4L3 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -19874,7 +27100,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - + @@ -19907,23 +27133,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S1L5RM7x7S4L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -19951,7 +27177,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -19984,23 +27210,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S1L6RM7x7S4L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -20028,7 +27254,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -20061,23 +27287,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S1L7RM7x7S4L6 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -20105,7 +27331,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -20138,23 +27364,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S2L1RM7x7S4L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -20182,7 +27408,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -20215,23 +27441,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S2L2RM7x7S5L1 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -20259,7 +27485,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -20292,23 +27518,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S2L3RM7x7S5L2 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -20336,7 +27562,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -20369,23 +27595,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S2L4RM7x7S5L3 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -20413,7 +27639,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -20446,23 +27672,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S2L5RM7x7S5L4 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -20490,7 +27716,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -20523,23 +27749,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S2L6RM7x7S5L5 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -20567,7 +27793,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -20600,23 +27826,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S2L7RM7x7S5L6 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -20644,7 +27870,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -20677,23 +27903,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S3L1RM7x7S5L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -20721,7 +27947,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -20754,23 +27980,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S3L2RM7x7S6L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -20798,7 +28024,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -20831,23 +28057,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S3L3RM7x7S6L2 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -20875,7 +28101,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -20908,23 +28134,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S3L4RM7x7S6L3 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -20952,7 +28178,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -20985,23 +28211,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S3L5RM7x7S6L4 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -21029,7 +28255,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -21062,23 +28288,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S3L6RM7x7S6L5 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -21106,7 +28332,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -21139,23 +28365,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S3L7RM7x7S6L6 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -21183,7 +28409,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -21216,23 +28442,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S4L1RM7x7S6L7 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -21260,7 +28486,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -21293,23 +28519,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S4L2RM7x7S7L1 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -21337,7 +28563,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -21370,23 +28596,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S4L3RM7x7S7L2 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -21414,7 +28640,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -21447,23 +28673,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermRM7x7S4L4RM7x7S7L3 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)High Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S7L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -21491,7 +28717,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -21524,23 +28750,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermRM7x7S4L5RM7x7S7L4 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S7L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -21568,7 +28794,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -21601,23 +28827,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermRM7x7S4L6RM7x7S7L5 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Extremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S7L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    - + - + - + @@ -21645,7 +28871,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -21678,23 +28904,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermRM7x7S4L7RM7x7S7L6 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)Extremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S7L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -21722,7 +28948,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -21755,38 +28981,40 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    + + + +
    +

    Rule-Based System Design

    TermRM7x7S5L1RM7x7S7L7 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Extremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S7L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + - + - @@ -21799,31 +29027,37 @@

    Low Risk (RM7x7 S:5 L:2)

    - + - + + + + - + + + + - + - + - @@ -21832,38 +29066,42 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    + + + + + +
    +

    Sabotage

    TermRM7x7S5L2RuleBasedSystemDesign Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)Rule-Based System Design
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -21876,14 +29114,17 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + - + + + + @@ -21891,7 +29132,10 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + + + + @@ -21900,7 +29144,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - @@ -21909,38 +29153,42 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    + + + +
    +

    Sampling Bias

    TermRM7x7S5L3Sabotage Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)Sabotage
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateSomething that acts as or causes Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -21953,31 +29201,34 @@

    High Risk (RM7x7 S:5 L:4)

    - + - + + + + - + - + - @@ -21986,38 +29237,41 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    + + + + +
    +

    Scam

    TermRM7x7S5L4SamplingBias Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Sampling Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#SamplingBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22030,14 +29284,17 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + - + + + + @@ -22045,7 +29302,10 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + + + + @@ -22054,7 +29314,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - @@ -22063,38 +29323,41 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    + + + + + +
    +

    Security Attack

    TermRM7x7S5L5Scam Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Scam
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighSomething that acts as or causes Scam
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22107,7 +29370,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -22118,20 +29381,14 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - - - - + - - - - + - @@ -22140,38 +29397,42 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    + + + + + + +
    +

    Security Breach

    TermRM7x7S5L6SecurityAttack Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Security Attack
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes an attack on security with the aim of undermining it
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22184,14 +29445,17 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + - + + + + @@ -22199,7 +29463,10 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + + + + @@ -22208,7 +29475,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - @@ -22217,38 +29484,41 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    + + + +
    +

    Selection Bias

    TermRM7x7S5L7SecurityBreach Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)Security Breach
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:OperationalSecurityRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes Security Breach
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22261,31 +29531,34 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + - + + + + - + - + - @@ -22294,38 +29567,51 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    + + + + + + + + +
    +

    Sex Discrimination

    TermRM7x7S6L1SelectionBias Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Selection Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#SelectionBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22338,7 +29624,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -22351,18 +29637,15 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + - - - - + - @@ -22371,38 +29654,44 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    + + + +
    +

    Sexism

    TermRM7x7S6L2SexDiscrimination Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)Sex Discrimination
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#SexDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateDiscrimination based on a person's biological sex
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22415,7 +29704,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -22428,18 +29717,15 @@

    High Risk (RM7x7 S:6 L:3)

    - + - - - - + - @@ -22448,38 +29734,39 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    + + + +
    +

    Sexual Harassment

    TermRM7x7S6L3Sexism Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Sexism
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#Sexism
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighDiscrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22490,10 +29777,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - - - - + @@ -22503,20 +29787,14 @@

    Very High Risk (RM7x7 S:6 L:4)

    - - - - + - - - - + - @@ -22525,38 +29803,44 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    + + + +
    +

    SexualOrientation Discrimination

    TermRM7x7S6L4SexualHarassment Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Sexual Harassment
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#SexualHarassment
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Harm + → risk:IndividualRisk
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + @@ -22569,7 +29853,7 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + @@ -22582,18 +29866,15 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + - - - - + - @@ -22602,38 +29883,39 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    + + + +
    +

    Sexual Violence

    TermRM7x7S6L5SexualOrientationDiscrimination Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)SexualOrientation Discrimination
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#SexualOrientationDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighDiscrimination based on a person's sexual orientation, typically against those who are not heterosexual
    Date Created2022-08-172024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22646,14 +29928,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + + + + @@ -22661,7 +29946,10 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + + + + @@ -22670,7 +29958,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - @@ -22679,42 +29967,47 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    +
    +

    Share Risk

    TermRM7x7S6L6SexualViolence Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Sexual Violence
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#SexualViolence
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:Harm + → risk:IndividualRisk
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes Sexual Violence
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -22723,7 +30016,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -22736,7 +30029,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + @@ -22747,7 +30040,7 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - @@ -22756,38 +30049,40 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    + + + +
    +

    Simpson'S Paradox Bias

    TermRM7x7S6L7ShareRisk Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Share Risk
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#ShareRisk
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
    Date Created2022-08-172024-05-19
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -22800,31 +30095,34 @@

    Low Risk (RM7x7 S:7 L:1)

    - + - + + + + - + - + - @@ -22833,38 +30131,39 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    + + + +
    +

    Social Disadvantage

    TermRM7x7S7L1SimpsonsParadoxBias Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)Simpson'S Paradox Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#SimpsonsParadoxBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:DataBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22877,7 +30176,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -22890,18 +30189,21 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + - + + + + - + - @@ -22910,38 +30212,40 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    + + + +
    +

    Societal Bias

    TermRM7x7S7L2SocialDisadvantage Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Social Disadvantage
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#SocialDisadvantage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateSomething that acts as or causes Social Disadvantage
    Date Created2022-08-172022-08-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -22954,31 +30258,34 @@

    High Risk (RM7x7 S:7 L:3)

    - + - + + + + - + - + - @@ -22987,38 +30294,39 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    + + + +
    +

    Societal Health & Safety

    TermRM7x7S7L3SocietalBias Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Societal Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#SocietalBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23029,10 +30337,7 @@

    Very High Risk (RM7x7 S:7 L:4)

    - - - - + @@ -23042,20 +30347,14 @@

    Very High Risk (RM7x7 S:7 L:4)

    - - - - + - - - - + - @@ -23064,38 +30363,38 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    + + + +
    +

    Societal Risk

    TermRM7x7S7L4SocietalHealthSafety Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Societal Health & Safety
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#SocietalHealthSafety
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SocietalRisk + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23108,7 +30407,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -23119,20 +30418,14 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - - - - + - - - - + - @@ -23141,42 +30434,47 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    +
    +

    Source Control

    TermRM7x7S7L5SocietalRisk Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Societal Risk
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#SocietalRisk
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighRisks and issues that affect or have the potential to affect society at large or specific groups in society
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -23185,7 +30483,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -23198,7 +30496,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -23209,7 +30507,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - @@ -23218,38 +30516,42 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    + + + + + +
    +

    Spoofing

    TermRM7x7S7L6SourceControl Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Source Control
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#SourceControl
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighRisk Mitigation Measure that controls the Source
    Date Created2022-08-172024-05-19
    See More: section RISK-MATRIX in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -23262,14 +30564,17 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - + + + + @@ -23277,7 +30582,10 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + + + + @@ -23286,7 +30594,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - @@ -23295,35 +30603,38 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    + + + +
    +

    Statistical Bias

    TermRM7x7S7L7Spoofing Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Spoofing
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#Spoofing
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes Spoofing
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23338,12 +30649,9 @@

    Rule-Based System Design

    - + - - - - + @@ -23362,13 +30670,13 @@

    Rule-Based System Design

    - + - @@ -23377,42 +30685,40 @@

    Rule-Based System Design

    -
    -

    Sabotage

    + + + + +
    +

    System Failure

    TermRuleBasedSystemDesignStatisticalBias Prefix risk
    LabelRule-Based System DesignStatistical Bias
    IRIhttps://w3id.org/dpv/risk#RuleBasedSystemDesignhttps://w3id.org/dpv/risk#StatisticalBias
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias + risk:DataBiasrisk:Biasrisk:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    ContributorsDaniel DohertyDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -23425,16 +30731,19 @@

    Sabotage

    - + - + + + + - + @@ -23455,7 +30764,7 @@

    Sabotage

    - @@ -23464,39 +30773,42 @@

    Sabotage

    -
    -

    Sampling Bias

    + + + + + +
    +

    System Intrusion

    TermSabotageSystemFailure Prefix risk
    LabelSabotageSystem Failure
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#SystemFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:OperationalSecurityRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes SabotageSomething that acts as or causes System Failure
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Landscape for Ransomware Attacks 2022
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -23509,7 +30821,7 @@

    Sampling Bias

    - + @@ -23518,25 +30830,28 @@

    Sampling Bias

    - + - + - + + + + - + - @@ -23545,38 +30860,39 @@

    Sampling Bias

    -
    -

    Scam

    + + + + +
    +

    System Malfunction

    TermSamplingBiasSystemIntrusion Prefix risk
    LabelSampling BiasSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#SamplingBiashttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:SecurityAttack + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when data records are not collected randomly from the intended populationSomething that acts as or causes System Intrusion
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -23590,9 +30906,12 @@

    Scam

    - + - + + + + @@ -23620,7 +30939,7 @@

    Scam

    - @@ -23629,45 +30948,39 @@

    Scam

    -
    -

    Security Attack

    + + + +
    +

    Terrorism

    TermScamSystemMalfunction Prefix risk
    LabelScamSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:OperationalSecurityRiskdpv:RiskConcept
    DefinitionSomething that acts as or causes ScamSomething that acts as or causes System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -23680,25 +30993,37 @@

    Security Attack

    - + - + + + + - - - + + + + + + + + + + + + - @@ -23706,50 +31031,51 @@

    Security Attack

    - -
    -

    Security Breach

    +
    +

    Threat

    TermSecurityAttackTerrorism Prefix risk
    LabelSecurity AttackTerrorism
    IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#Terrorism
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:SocietalRiskdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itSomething that acts as or causes Terrorism
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + + + + + + + + @@ -23758,37 +31084,28 @@

    Security Breach

    - + - - - - + - + - - - - - - - - + + - @@ -23796,43 +31113,40 @@

    Security Breach

    - -
    -

    Selection Bias

    +
    +

    Threat Source

    TermSecurityBreachThreat Prefix risk
    LabelSecurity BreachThreat
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#Threat
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:RiskSourcedpv:RiskConcept
    Subject of relation risk:exploitsVulnerability, + risk:hasThreatSource +
    Object of relation risk:causedByThreat, + risk:hasRiskSource, + risk:isExploitedBy +
    DefinitionSomething that acts as or causes Security BreachRisk source event which causes Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - + - + + + + @@ -23841,34 +31155,28 @@

    Selection Bias

    - + - - - - + - + - - - - + - @@ -23880,37 +31188,43 @@

    Selection Bias

    - - -
    -

    Sexual Violence

    +
    +

    Transphobia

    TermSelectionBiasThreatSource Prefix risk
    LabelSelection BiasThreat Source
    IRIhttps://w3id.org/dpv/risk#SelectionBiashttps://w3id.org/dpv/risk#ThreatSource
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept -
    Object of relation risk:hasThreatSource +
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionSource of threat event, including both agent and non-agent sources
    Source
    Date Created2024-09-132024-02-14
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section CORE in RISK
    - + - + - + - + - + + @@ -23923,37 +31237,28 @@

    Sexual Violence

    - + - - - - + - + - - - - - - - - + + - @@ -23962,47 +31267,47 @@

    Sexual Violence

    -
    -

    Share Risk

    + + + + + + +
    +

    Unauthorised Access to Premises

    TermSexualViolenceTransphobia Prefix risk
    LabelSexual ViolenceTransphobia
    IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#Transphobia
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IndividualRisk + risk:Sexism + → risk:Discrimination + → risk:RiskConcept +
    Broader/Parent types risk:Sexism + → risk:Discrimination + → risk:SocietalRisk + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Sexual ViolenceHostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -24011,22 +31316,28 @@

    Share Risk

    - + - + + + + - + - + + + + @@ -24035,7 +31346,7 @@

    Share Risk

    - @@ -24044,37 +31355,42 @@

    Share Risk

    -
    -

    Simpson'S Paradox Bias

    + + + + + + +
    +

    Unauthorised Activity

    TermShareRiskUnauthorisedAccesstoPremises Prefix risk
    LabelShare RiskUnauthorised Access to Premises
    IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#UnauthorisedAccesstoPremises
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Unauthorised Access to Premises
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24087,34 +31403,25 @@

    Simpson'S Paradox Bias

    - + - - - - + - - - - + - - - - + - @@ -24123,35 +31430,41 @@

    Simpson'S Paradox Bias

    -
    -

    Social Disadvantage

    + + + + + +
    +

    Unauthorised Code Access

    TermSimpsonsParadoxBiasUnauthorisedActivity Prefix risk
    LabelSimpson'S Paradox BiasUnauthorised Activity
    IRIhttps://w3id.org/dpv/risk#SimpsonsParadoxBiashttps://w3id.org/dpv/risk#UnauthorisedActivity
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combinedSomething that acts as or causes Unauthorised Activity
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24165,20 +31478,23 @@

    Social Disadvantage

    - + - + + + + - + @@ -24186,13 +31502,13 @@

    Social Disadvantage

    - + - @@ -24201,37 +31517,41 @@

    Social Disadvantage

    -
    -

    Societal Bias

    + + + + +
    +

    Unauthorised Code Disclosure

    TermSocialDisadvantageUnauthorisedCodeAccess Prefix risk
    LabelSocial DisadvantageUnauthorised Code Access
    IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#UnauthorisedCodeAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Social DisadvantageSomething that acts as or causes Unauthorised Code Access
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-192022-08-17
    Date Modified
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24244,7 +31564,7 @@

    Societal Bias

    - + @@ -24253,25 +31573,28 @@

    Societal Bias

    - + - + - + + + + - + - @@ -24280,35 +31603,40 @@

    Societal Bias

    -
    -

    Societal Health & Safety

    + + + + +
    +

    Unauthorised Code Modification

    TermSocietalBiasUnauthorisedCodeDisclosure Prefix risk
    LabelSocietal BiasUnauthorised Code Disclosure
    IRIhttps://w3id.org/dpv/risk#SocietalBiashttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in societySomething that acts as or causes Unauthorised Code Disclosure
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24320,24 +31648,39 @@

    Societal Health & Safety

    - + + + + - + + + + - - - + + + + + + + + + + + + - @@ -24346,35 +31689,41 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + + + + +
    +

    Unauthorised Data Access

    TermSocietalHealthSafetyUnauthorisedCodeModification Prefix risk
    LabelSocietal Health & SafetyUnauthorised Code Modification
    IRIhttps://w3id.org/dpv/risk#SocietalHealthSafetyhttps://w3id.org/dpv/risk#UnauthorisedCodeModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code Modification
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24387,25 +31736,37 @@

    Societal Risk

    - + - + + + + - - - + + + + + + + + + + + + - @@ -24414,47 +31775,45 @@

    Societal Risk

    -
    -

    Source Control

    + + + + +
    +

    Unauthorised Data Disclosure

    TermSocietalRiskUnauthorisedDataAccess Prefix risk
    LabelSocietal RiskUnauthorised Data Access
    IRIhttps://w3id.org/dpv/risk#SocietalRiskhttps://w3id.org/dpv/risk#UnauthorisedDataAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societySomething that acts as or causes Unauthorised Data Access
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -24463,22 +31822,28 @@

    Source Control

    - + - + + + + - + - + + + + @@ -24487,7 +31852,7 @@

    Source Control

    - @@ -24496,45 +31861,40 @@

    Source Control

    -
    -

    Spoofing

    + + + + +
    +

    Unauthorised Data Modification

    TermSourceControlUnauthorisedDataDisclosure Prefix risk
    LabelSource ControlUnauthorised Data Disclosure
    IRIhttps://w3id.org/dpv/risk#SourceControlhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the SourceSomething that acts as or causes Unauthorised Data Disclosure
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -24548,7 +31908,7 @@

    Spoofing

    - + @@ -24557,7 +31917,7 @@

    Spoofing

    - + @@ -24578,7 +31938,7 @@

    Spoofing

    - @@ -24587,37 +31947,41 @@

    Spoofing

    -
    -

    Statistical Bias

    + + + + +
    +

    Unauthorised Information Disclosure

    TermSpoofingUnauthorisedDataModification Prefix risk
    LabelSpoofingUnauthorised Data Modification
    IRIhttps://w3id.org/dpv/risk#Spoofinghttps://w3id.org/dpv/risk#UnauthorisedDataModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes SpoofingSomething that acts as or causes Unauthorised Data Modification
    SourceISO/IEC 27005:2018, ISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24630,7 +31994,7 @@

    Statistical Bias

    - + @@ -24639,25 +32003,28 @@

    Statistical Bias

    - + - + - + + + + - + - @@ -24666,38 +32033,40 @@

    Statistical Bias

    -
    -

    System Failure

    + + + + +
    +

    Unauthorised Re-Identification

    TermStatisticalBiasUnauthorisedInformationDisclosure Prefix risk
    LabelStatistical BiasUnauthorised Information Disclosure
    IRIhttps://w3id.org/dpv/risk#StatisticalBiashttps://w3id.org/dpv/risk#UnauthorisedInformationDisclosure
    Typerdfs:Class, skos:Concept, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept
    DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimatesSomething that acts as or causes Unauthorised Information Disclosure
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel DohertyHarshvardhan J. Pandit
    See More: section BIAS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -24711,26 +32080,20 @@

    System Failure

    - + - - - - + - - - - + - + @@ -24738,13 +32101,13 @@

    System Failure

    - + - @@ -24753,45 +32116,41 @@

    System Failure

    -
    -

    System Intrusion

    + + + + +
    +

    Unauthorised Resource Use

    TermSystemFailureUnauthorisedReidentification Prefix risk
    LabelSystem FailureUnauthorised Re-Identification
    IRIhttps://w3id.org/dpv/risk#SystemFailurehttps://w3id.org/dpv/risk#UnauthorisedReidentification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes System FailureSomething that acts as or causes Unauthorised Re-Identification
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172022-08-19
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -24804,7 +32163,7 @@

    System Intrusion

    - + @@ -24813,7 +32172,7 @@

    System Intrusion

    - + @@ -24834,7 +32193,7 @@

    System Intrusion

    - @@ -24843,38 +32202,41 @@

    System Intrusion

    -
    -

    System Malfunction

    + + + + + +
    +

    Unauthorised System Access

    TermSystemIntrusionUnauthorisedResourceUse Prefix risk
    LabelSystem IntrusionUnauthorised Resource Use
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#UnauthorisedResourceUse
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes System IntrusionSomething that acts as or causes Unauthorised Resource Use
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -24888,12 +32250,9 @@

    System Malfunction

    - + - - - - + @@ -24921,7 +32280,7 @@

    System Malfunction

    - @@ -24930,35 +32289,40 @@

    System Malfunction

    -
    -

    Terrorism

    + + + + +
    +

    Unauthorised System Modification

    TermSystemMalfunctionUnauthorisedSystemAccess Prefix risk
    LabelSystem MalfunctionUnauthorised System Access
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#UnauthorisedSystemAccess
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:OperationalSecurityRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionSomething that acts as or causes Unauthorised System Access
    Usage NoteHere system refers to both hardware and software systems
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -24972,7 +32336,7 @@

    Terrorism

    - + @@ -24981,7 +32345,7 @@

    Terrorism

    - + @@ -25002,7 +32366,7 @@

    Terrorism

    - @@ -25010,51 +32374,47 @@

    Terrorism

    -
    -

    Threat

    + + + + + + +
    +

    Unwanted Code Deletion

    TermTerrorismUnauthorisedSystemModification Prefix risk
    LabelTerrorismUnauthorised System Modification
    IRIhttps://w3id.org/dpv/risk#Terrorismhttps://w3id.org/dpv/risk#UnauthorisedSystemModification
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    DefinitionSomething that acts as or causes TerrorismSomething that acts as or causes Unauthorised System Modification
    SourceISO/IEC 27005:2018ENISA Methodology for Sectoral Cybersecurity Assessments
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + + @@ -25063,28 +32423,37 @@

    Threat

    - + - + + + + - + - - + + + + + + + + - @@ -25092,40 +32461,47 @@

    Threat

    -
    -

    Threat Source

    + + + + + + +
    +

    Unwanted Data Deletion

    TermThreatUnwantedCodeDeletion Prefix risk
    LabelThreatUnwanted Code Deletion
    IRIhttps://w3id.org/dpv/risk#Threathttps://w3id.org/dpv/risk#UnwantedCodeDeletion
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskSource + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept
    Subject of relation risk:exploitsVulnerability, - risk:hasThreatSource -
    Object of relation risk:causedByThreat, - risk:hasRiskSource, - risk:isExploitedBy -
    DefinitionRisk source event which causes RiskSomething that acts as or causes Unwanted Code Deletion
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + - - - - + @@ -25134,28 +32510,37 @@

    Threat Source

    - + - + + + + - + - - + + + + + + + + - @@ -25164,45 +32549,41 @@

    Threat Source

    -
    -

    Unauthorised Access to Premises

    + + + + +
    +

    Unwanted Disclosure of Data

    TermThreatSourceUnwantedDataDeletion Prefix risk
    LabelThreat SourceUnwanted Data Deletion
    IRIhttps://w3id.org/dpv/risk#ThreatSourcehttps://w3id.org/dpv/risk#UnwantedDataDeletion
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:UnauthorisedActivity + → risk:ExternalSecurityThreat + → dpv:RiskConcept +
    Object of relation risk:hasThreatSource -
    DefinitionSource of threat event, including both agent and non-agent sourcesSomething that acts as or causes Unwanted Data Deletion
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -25215,7 +32596,7 @@

    Unauthorised Access to Premises

    - + @@ -25245,7 +32626,7 @@

    Unauthorised Access to Premises

    - @@ -25254,45 +32635,37 @@

    Unauthorised Access to Premises

    -
    -

    Unauthorised Activity

    + + +
    +

    User Risks

    TermUnauthorisedAccesstoPremisesUnwantedDisclosureData Prefix risk
    LabelUnauthorised Access to PremisesUnwanted Disclosure of Data
    IRIhttps://w3id.org/dpv/risk#UnauthorisedAccesstoPremiseshttps://w3id.org/dpv/risk#UnwantedDisclosureData
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat + risk:UnauthorisedActivity + → risk:ExternalSecurityThreatdpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesSomething that acts as or causes Unwanted Disclosure of Data
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - @@ -25305,7 +32678,7 @@

    Unauthorised Activity

    - + @@ -25323,7 +32696,7 @@

    Unauthorised Activity

    - @@ -25332,46 +32705,48 @@

    Unauthorised Activity

    -
    -

    Unauthorised Code Access

    +
    +

    Very High Likelihood

    TermUnauthorisedActivityUserRisks Prefix risk
    LabelUnauthorised ActivityUser Risks
    IRIhttps://w3id.org/dpv/risk#UnauthorisedActivityhttps://w3id.org/dpv/risk#UserRisks
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised ActivityConcepts associated with risks that arise due to User or Human use
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + + + + @@ -25380,28 +32755,25 @@

    Unauthorised Code Access

    - + - + + + + - - - - + - + - - - - + @@ -25410,7 +32782,7 @@

    Unauthorised Code Access

    - @@ -25419,43 +32791,48 @@

    Unauthorised Code Access

    -
    -

    Unauthorised Code Disclosure

    +
    +

    Very High Risk

    TermUnauthorisedCodeAccessVeryHighLikelihood Prefix risk
    LabelUnauthorised Code AccessVery High Likelihood
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeAccesshttps://w3id.org/dpv/risk#VeryHighLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:IntegrityConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Unauthorised Code AccessLevel where Likelihood is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25464,28 +32841,25 @@

    Unauthorised Code Disclosure

    - + - + + + + - - - - + - + - - - - + @@ -25494,7 +32868,7 @@

    Unauthorised Code Disclosure

    - @@ -25503,43 +32877,48 @@

    Unauthorised Code Disclosure

    -
    -

    Unauthorised Code Modification

    +
    +

    Very High Severity

    TermUnauthorisedCodeDisclosureVeryHighRisk Prefix risk
    LabelUnauthorised Code DisclosureVery High Risk
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeDisclosurehttps://w3id.org/dpv/risk#VeryHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept + risk:5RiskLevels + → dpv:RiskLevel
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureLevel where Risk is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25548,28 +32927,25 @@

    Unauthorised Code Modification

    - + - + + + + - - - - + - + - - - - + @@ -25578,7 +32954,7 @@

    Unauthorised Code Modification

    - @@ -25587,43 +32963,48 @@

    Unauthorised Code Modification

    -
    -

    Unauthorised Data Access

    +
    +

    Very Low Likelihood

    TermUnauthorisedCodeModificationVeryHighSeverity Prefix risk
    LabelUnauthorised Code ModificationVery High Severity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedCodeModificationhttps://w3id.org/dpv/risk#VeryHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5SeverityLevels + → dpv:Severity
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Unauthorised Code ModificationLevel where Severity is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25632,28 +33013,25 @@

    Unauthorised Data Access

    - + - + + + + - - - - + - + - - - - + @@ -25662,7 +33040,7 @@

    Unauthorised Data Access

    - @@ -25671,43 +33049,48 @@

    Unauthorised Data Access

    -
    -

    Unauthorised Data Disclosure

    +
    +

    Very Low Risk

    TermUnauthorisedDataAccessVeryLowLikelihood Prefix risk
    LabelUnauthorised Data AccessVery Low Likelihood
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataAccesshttps://w3id.org/dpv/risk#VeryLowLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ConfidentialityConcept + risk:5LikelihoodLevels + → dpv:Likelihood
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Unauthorised Data AccessLevel where Likelihood is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25716,28 +33099,25 @@

    Unauthorised Data Disclosure

    - + - + + + + - - - - + - + - - - - + @@ -25746,7 +33126,7 @@

    Unauthorised Data Disclosure

    - @@ -25755,43 +33135,48 @@

    Unauthorised Data Disclosure

    -
    -

    Unauthorised Data Modification

    +
    +

    Very Low Severity

    TermUnauthorisedDataDisclosureVeryLowRisk Prefix risk
    LabelUnauthorised Data DisclosureVery Low Risk
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataDisclosurehttps://w3id.org/dpv/risk#VeryLowRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ConfidentialityConcept + risk:5RiskLevels + → dpv:RiskLevel
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureLevel where Risk is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - + + + + @@ -25800,28 +33185,25 @@

    Unauthorised Data Modification

    - + - + + + + - - - - + - + - - - - + @@ -25830,7 +33212,7 @@

    Unauthorised Data Modification

    - @@ -25839,39 +33221,37 @@

    Unauthorised Data Modification

    -
    -

    Unauthorised Information Disclosure

    + + +
    +

    Violating Code of Conduct

    TermUnauthorisedDataModificationVeryLowSeverity Prefix risk
    LabelUnauthorised Data ModificationVery Low Severity
    IRIhttps://w3id.org/dpv/risk#UnauthorisedDataModificationhttps://w3id.org/dpv/risk#VeryLowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:5SeverityLevels + → dpv:Severity
    Broader/Parent types risk:IntegrityConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Unauthorised Data ModificationLevel where Severity is Very Low
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - @@ -25884,16 +33264,19 @@

    Unauthorised Information Disclosure

    - + - + + + + - + @@ -25914,7 +33297,7 @@

    Unauthorised Information Disclosure

    - @@ -25923,39 +33306,37 @@

    Unauthorised Information Disclosure

    -
    -

    Unauthorised Re-Identification

    + + +
    +

    Violation of Contractual Obligation

    TermUnauthorisedInformationDisclosureViolatingCodeOfConduct Prefix risk
    LabelUnauthorised Information DisclosureViolating Code of Conduct
    IRIhttps://w3id.org/dpv/risk#UnauthorisedInformationDisclosurehttps://w3id.org/dpv/risk#ViolatingCodeOfConduct
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureSomething that acts as or causes Violation of Code of Conduct
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -25968,20 +33349,26 @@

    Unauthorised Re-Identification

    - + - + + + + - + + + + - + @@ -25989,13 +33376,13 @@

    Unauthorised Re-Identification

    - + - @@ -26004,39 +33391,37 @@

    Unauthorised Re-Identification

    -
    -

    Unauthorised Resource Use

    + + +
    +

    Violating Ethics Code

    TermUnauthorisedReidentificationViolatingContractualObligation Prefix risk
    LabelUnauthorised Re-IdentificationViolation of Contractual Obligation
    IRIhttps://w3id.org/dpv/risk#UnauthorisedReidentificationhttps://w3id.org/dpv/risk#ViolatingContractualObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationSomething that acts as or causes Violation of Contractual Obligations
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-192022-08-17
    Date Modified
    ContributorsGeorg P. KrogHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -26049,9 +33434,12 @@

    Unauthorised Resource Use

    - + - + + + + @@ -26079,7 +33467,7 @@

    Unauthorised Resource Use

    - @@ -26088,42 +33476,37 @@

    Unauthorised Resource Use

    -
    -

    Unauthorised System Access

    + + +
    +

    Violation of Legal Obligations

    TermUnauthorisedResourceUseViolatingEthicsCode Prefix risk
    LabelUnauthorised Resource UseViolating Ethics Code
    IRIhttps://w3id.org/dpv/risk#UnauthorisedResourceUsehttps://w3id.org/dpv/risk#ViolatingEthicsCode
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised Resource UseSomething that acts as or causes Violation of Ethics Code
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26136,9 +33519,12 @@

    Unauthorised System Access

    - + - + + + + @@ -26166,7 +33552,7 @@

    Unauthorised System Access

    - @@ -26175,39 +33561,37 @@

    Unauthorised System Access

    -
    -

    Unauthorised System Modification

    + + +
    +

    Violating Policy

    TermUnauthorisedSystemAccessViolatingLegalObligation Prefix risk
    LabelUnauthorised System AccessViolation of Legal Obligations
    IRIhttps://w3id.org/dpv/risk#UnauthorisedSystemAccesshttps://w3id.org/dpv/risk#ViolatingLegalObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised System AccessSomething that acts as or causes Violation of Legal Obligations
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -26220,37 +33604,25 @@

    Unauthorised System Modification

    - + - - - - + - - - - - - - - - - - - + + + - @@ -26259,42 +33631,37 @@

    Unauthorised System Modification

    -
    -

    Unwanted Code Deletion

    + + +
    +

    Violation of Statutory Obligations

    TermUnauthorisedSystemModificationViolatingPolicy Prefix risk
    LabelUnauthorised System ModificationViolating Policy
    IRIhttps://w3id.org/dpv/risk#UnauthorisedSystemModificationhttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unauthorised System ModificationSomething that acts as or causes violation of policy which can be either internal or external policy
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26307,16 +33674,19 @@

    Unwanted Code Deletion

    - + - + + + + - + @@ -26337,7 +33707,7 @@

    Unwanted Code Deletion

    - @@ -26346,42 +33716,39 @@

    Unwanted Code Deletion

    -
    -

    Unwanted Data Deletion

    + + + +
    +

    Violence against children

    TermUnwantedCodeDeletionViolatingStatutoryObligations Prefix risk
    LabelUnwanted Code DeletionViolation of Statutory Obligations
    IRIhttps://w3id.org/dpv/risk#UnwantedCodeDeletionhttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:ViolatingObligation
    DefinitionSomething that acts as or causes Unwanted Code DeletionSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    SourceENISA Methodology for Sectoral Cybersecurity AssessmentsISO/IEC 27005:2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - @@ -26394,16 +33761,19 @@

    Unwanted Data Deletion

    - + - + + + + - + @@ -26424,7 +33794,7 @@

    Unwanted Data Deletion

    - @@ -26432,44 +33802,47 @@

    Unwanted Data Deletion

    - -
    -

    Unwanted Disclosure of Data

    +
    +

    Vulnerability

    TermUnwantedDataDeletionViolenceAgainstChildren Prefix risk
    LabelUnwanted Data DeletionViolence against children
    IRIhttps://w3id.org/dpv/risk#UnwantedDataDeletionhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:AvailabilityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Broader/Parent types risk:IntegrityConcept + risk:Harm + → risk:IndividualRisk
    DefinitionSomething that acts as or causes Unwanted Data DeletionSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    See More: section RISK-CONSEQUENCES in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - + + + + + + + + + @@ -26478,87 +33851,251 @@

    Unwanted Disclosure of Data

    - + - - - - + - + - - - - - - - - + + -
    TermUnwantedDisclosureDataVulnerability Prefix risk
    LabelUnwanted Disclosure of DataVulnerability
    IRIhttps://w3id.org/dpv/risk#UnwantedDisclosureDatahttps://w3id.org/dpv/risk#Vulnerability
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:ConfidentialityConcept -
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
    Subject of relation risk:isExploitedBy, + risk:isVulnerabilityOf +
    Object of relation risk:causedByVulnerability, + risk:exploitsVulnerability, + risk:hasVulnerability +
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    + +
    +
    +

    Properties

    + -
    -

    User Risks

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    caused by threat

    - + - + - + - + - - - - + - + + + + - + @@ -26569,14 +34106,17 @@

    User Risks

    - + + + + - @@ -26584,63 +34124,50 @@

    User Risks

    - -
    -

    Very High Likelihood

    +
    +

    caused by vulnerability

    TermUserRiskscausedByThreat Prefix risk
    LabelUser Riskscaused by threat
    IRIhttps://w3id.org/dpv/risk#UserRiskshttps://w3id.org/dpv/risk#causedByThreat
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types dpv:RiskConcept -
    Range includes risk:Threat +
    DefinitionConcepts associated with risks that arise due to User or Human useIndicates the cause of associated context (subject) was the indicated threat (object)
    Date Created2024-02-14
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + @@ -26651,18 +34178,15 @@

    Very High Likelihood

    - + - - - - + - @@ -26671,148 +34195,279 @@

    Very High Likelihood

    -
    -

    Very High Risk

    -
    TermVeryHighLikelihoodcausedByVulnerability Prefix risk
    LabelVery High Likelihoodcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#VeryHighLikelihoodhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdf:Property, skos:Concept
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    Range includes risk:Vulnerability +
    DefinitionLevel where Likelihood is Very HighIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermVeryHighRiskPrefixrisk
    LabelVery High Risk
    IRIhttps://w3id.org/dpv/risk#VeryHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Very High
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    -
    -

    Very High Severity

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    exploits vulnerability

    - + - + - + - + - - - - - - - - - - - - + + + + + + + + + + - + - - - - + @@ -26823,18 +34478,15 @@

    Very High Severity

    - + - - - - + - @@ -26843,63 +34495,140 @@

    Very High Severity

    -
    -

    Very Low Likelihood

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    has control

    TermVeryHighSeverityexploitsVulnerability Prefix risk
    LabelVery High Severityexploits vulnerability
    IRIhttps://w3id.org/dpv/risk#VeryHighSeverityhttps://w3id.org/dpv/risk#exploitsVulnerability
    Typerdfs:Class, skos:Concept, dpv:Severityrdf:Property, skos:Concept
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity -
    Object of relation dpv:hasSeverity -
    Domain includes risk:Threat +
    Range includes risk:Vulnerability +
    DefinitionLevel where Severity is Very HighIndicates the threat (subject) exploits the indicated vulnerability (object)
    Usage NoteThe suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + + + + @@ -26909,18 +34638,15 @@

    Very Low Likelihood

    - + - - - - + - @@ -26928,63 +34654,50 @@

    Very Low Likelihood

    - -
    -

    Very Low Risk

    +
    +

    has incident

    TermVeryLowLikelihoodhasControl Prefix risk
    LabelVery Low Likelihoodhas control
    IRIhttps://w3id.org/dpv/risk#VeryLowLikelihoodhttps://w3id.org/dpv/risk#hasControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdf:Property, skos:Concept
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood -
    Object of relation dpv:hasLikelihood -
    Range includes risk:RiskControl +
    DefinitionLevel where Likelihood is Very LowIndicates the use of specified control
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in DEX
    - + - + - + - + - - - - - - - - - - - + + + + + + - + - - - - + @@ -26995,18 +34708,15 @@

    Very Low Risk

    - + - - - - + - @@ -27014,63 +34724,54 @@

    Very Low Risk

    - -
    -

    Very Low Severity

    +
    +

    has risk source

    TermVeryLowRiskhasIncident Prefix risk
    LabelVery Low Riskhas incident
    IRIhttps://w3id.org/dpv/risk#VeryLowRiskhttps://w3id.org/dpv/risk#hasIncident
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdf:Property, skos:Concept
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    Range includes risk:Incident +
    DefinitionLevel where Risk is Very LowIndicates an incident is associated with the specified context
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - - - - - - - - - + + + + + + + + + + - + - - - - + @@ -27081,18 +34782,15 @@

    Very Low Severity

    - + - - - - + - @@ -27100,83 +34798,73 @@

    Very Low Severity

    - -
    -

    Violating Code of Conduct

    +
    +

    has threat source

    TermVeryLowSeverityhasRiskSource Prefix risk
    LabelVery Low Severityhas risk source
    IRIhttps://w3id.org/dpv/risk#VeryLowSeverityhttps://w3id.org/dpv/risk#hasRiskSource
    Typerdfs:Class, skos:Concept, dpv:Severityrdf:Property, skos:Concept
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity -
    Object of relation dpv:hasSeverity -
    Domain includes dpv:Risk +
    Range includes risk:RiskSource +
    DefinitionLevel where Severity is Very LowIndicates the risk (subject) has the indicated risk source (object)
    Usage NoteThe suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
    Date Created2022-08-182024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - - - + - - + + + + + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27184,83 +34872,69 @@

    Violating Code of Conduct

    - -
    -

    Violation of Contractual Obligation

    +
    +

    has vulnerability

    TermViolatingCodeOfConducthasThreatSource Prefix risk
    LabelViolating Code of Conducthas threat source
    IRIhttps://w3id.org/dpv/risk#ViolatingCodeOfConducthttps://w3id.org/dpv/risk#hasThreatSource
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Threat +
    Range includes risk:ThreatSource +
    DefinitionSomething that acts as or causes Violation of Code of ConductIndicates the threat (subject) has the indicated source (object)
    Usage NoteThis concept was called "ViolationCodeConduct" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - + + + + - + - - - - + - - - - - - + + + - + - - - - - - - - + + - @@ -27269,82 +34943,239 @@

    Violation of Contractual Obligation

    -
    -

    Violating Ethics Code

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    is exploited by

    TermViolatingContractualObligationhasVulnerability Prefix risk
    LabelViolation of Contractual Obligationhas vulnerability
    IRIhttps://w3id.org/dpv/risk#ViolatingContractualObligationhttps://w3id.org/dpv/risk#hasVulnerability
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Range includes risk:Vulnerability +
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsIndicates the associated context (subject) has indicated vulnerability (object)
    Usage NoteThis concept was called "ViolationContractualObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - - + + + + + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27352,83 +35183,69 @@

    Violating Ethics Code

    - -
    -

    Violation of Legal Obligations

    +
    +

    is vulnerability of

    TermViolatingEthicsCodeisExploitedBy Prefix risk
    LabelViolating Ethics Codeis exploited by
    IRIhttps://w3id.org/dpv/risk#ViolatingEthicsCodehttps://w3id.org/dpv/risk#isExploitedBy
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Vulnerability +
    Range includes risk:Threat +
    DefinitionSomething that acts as or causes Violation of Ethics CodeIndicates the vulnerability (subject) is exploited by the indicated threat (object)
    Usage NoteThis concept was called "ViolationEthicalCode" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - + - + - + - + - - - - + - + + + + - + - - - - + - - - - + - + - - - - - - - - + + - @@ -27437,294 +35254,322 @@

    Violation of Legal Obligations

    -
    -

    Violating Policy

    -
    TermViolatingLegalObligationisVulnerabilityOf Prefix risk
    LabelViolation of Legal Obligationsis vulnerability of
    IRIhttps://w3id.org/dpv/risk#ViolatingLegalObligationhttps://w3id.org/dpv/risk#isVulnerabilityOf
    Typerdfs:Class, skos:Concept, dpv:RiskConceptrdf:Property, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    Domain includes risk:Vulnerability +
    DefinitionSomething that acts as or causes Violation of Legal ObligationsIndicates the vulnerability (subject) is associated with indicated context (object)
    Usage NoteThis concept was called "ViolationRegulatoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolatingPolicyPrefixrisk
    LabelViolating Policy
    IRIhttps://w3id.org/dpv/risk#ViolatingPolicy
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policy
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Violation of Statutory Obligations

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolatingStatutoryObligationsPrefixrisk
    LabelViolation of Statutory Obligations
    IRIhttps://w3id.org/dpv/risk#ViolatingStatutoryObligations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept -
    DefinitionSomething that acts as or causes Violation of Statutory Obligations
    Usage NoteThis concept was called "ViolationStatutoryObligations" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Violence against children

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermViolenceAgainstChildrenPrefixrisk
    LabelViolence against children
    IRIhttps://w3id.org/dpv/risk#ViolenceAgainstChildren
    Typerdfs:Class, skos:Concept, dpv:RiskConcept
    Broader/Parent types risk:IndividualRisk -
    DefinitionSomething that acts as or causes Child Violence
    Usage NoteThis concept was called "ChildViolence" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONSEQUENCES in RISK -
    -
    -
    -

    Vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    refers to risk

    - + - + - + - + - - - - - - - - - - + + + + + + + + + - + + + + @@ -27742,19 +35587,178 @@

    Vulnerability

    -
    TermVulnerabilityrefersToRisk Prefix risk
    LabelVulnerabilityrefers to risk
    IRIhttps://w3id.org/dpv/risk#Vulnerabilityhttps://w3id.org/dpv/risk#refersToRisk
    Typerdfs:Class, skos:Conceptrdf:Property, skos:Concept
    Subject of relation risk:isExploitedBy, - risk:isVulnerabilityOf -
    Object of relation risk:causedByVulnerability, - risk:exploitsVulnerability, - risk:hasVulnerability -
    Domain includes dpv:Incident +
    Range includes dpv:Risk +
    DefinitionIntrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause RiskIndicates the incident (subject) is a materialisation of the indicated risk (object)
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    See More: section CORE in RISK + section CORE in DEX
    - -
    -
    -

    Properties

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -27878,7 +35882,6 @@

    Properties

    - @@ -27887,144 +35890,12 @@

    Properties

    -
    -

    caused by threat

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermcausedByThreatPrefixrisk
    Labelcaused by threat
    IRIhttps://w3id.org/dpv/risk#causedByThreat
    Typerdf:Property, skos:Concept
    Range includes risk:Threat -
    DefinitionIndicates the cause of associated context (subject) was the indicated threat (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    caused by vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability -
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28072,8 +35943,6 @@

    caused by vulnerability

    - - @@ -28133,78 +36002,8 @@

    caused by vulnerability

    -
    -

    exploits vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermexploitsVulnerabilityPrefixrisk
    Labelexploits vulnerability
    IRIhttps://w3id.org/dpv/risk#exploitsVulnerability
    Typerdf:Property, skos:Concept
    Domain includes risk:Threat -
    Range includes risk:Vulnerability -
    DefinitionIndicates the threat (subject) exploits the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28255,365 +36054,24 @@

    exploits vulnerability

    -
    -

    has control

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasControlPrefixrisk
    Labelhas control
    IRIhttps://w3id.org/dpv/risk#hasControl
    Typerdf:Property, skos:Concept
    Range includes risk:RiskControl -
    DefinitionIndicates the use of specified control
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-02-14
    See More: section CORE in DEX -
    -
    -
    -

    has incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasIncidentPrefixrisk
    Labelhas incident
    IRIhttps://w3id.org/dpv/risk#hasIncident
    Typerdf:Property, skos:Concept
    Range includes risk:Incident -
    DefinitionIndicates an incident is associated with the specified context
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has risk source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasRiskSourcePrefixrisk
    Labelhas risk source
    IRIhttps://w3id.org/dpv/risk#hasRiskSource
    Typerdf:Property, skos:Concept
    Domain includes dpv:Risk -
    Range includes risk:RiskSource -
    DefinitionIndicates the risk (subject) has the indicated risk source (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has threat source

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasThreatSourcePrefixrisk
    Labelhas threat source
    IRIhttps://w3id.org/dpv/risk#hasThreatSource
    Typerdf:Property, skos:Concept
    Domain includes risk:Threat -
    Range includes risk:ThreatSource -
    DefinitionIndicates the threat (subject) has the indicated source (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    has vulnerability

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermhasVulnerabilityPrefixrisk
    Labelhas vulnerability
    IRIhttps://w3id.org/dpv/risk#hasVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability -
    DefinitionIndicates the associated context (subject) has indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -28646,8 +36104,6 @@

    has vulnerability

    - - @@ -28727,148 +36183,12 @@

    has vulnerability

    -
    -

    is exploited by

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermisExploitedByPrefixrisk
    Labelis exploited by
    IRIhttps://w3id.org/dpv/risk#isExploitedBy
    Typerdf:Property, skos:Concept
    Domain includes risk:Vulnerability -
    Range includes risk:Threat -
    DefinitionIndicates the vulnerability (subject) is exploited by the indicated threat (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    -
    -

    is vulnerability of

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermisVulnerabilityOfPrefixrisk
    Labelis vulnerability of
    IRIhttps://w3id.org/dpv/risk#isVulnerabilityOf
    Typerdf:Property, skos:Concept
    Domain includes risk:Vulnerability -
    DefinitionIndicates the vulnerability (subject) is associated with indicated context (object)
    Date Created2024-02-14
    See More: section CORE in RISK -
    -
    @@ -29003,114 +36323,145 @@

    is vulnerability of

    -
    -

    refers to risk

    - - - - - - - - - - - - - - - - - - - - - - - - + +
    +

    DPV uses the following terms from [[RDF]] and [[RDFS]] with their defined meanings:

    +
      +
    • rdf:type to denote a concept is an instance of another concept
    • +
    • rdfs:Class to denote a concept is a Class or a category
    • +
    • rdfs:subClassOf to specify the concept is a subclass (subtype, sub-category, subset) of another concept
    • +
    • rdf:Property to denote a concept is a property or a relation
    • +
    +

    The following external concepts are re-used within DPV:

    +

    External

    + + - -
    - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - -
    TermrefersToRiskPrefixrisk
    Labelrefers to risk
    IRIhttps://w3id.org/dpv/risk#refersToRisk
    Typerdf:Property, skos:Concept
    Domain includes dpv:Incident -
    Range includes dpv:Risk -
    DefinitionIndicates the incident (subject) is a materialisation of the indicated risk (object)
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-14
    See More: section CORE in DEX -
    -
    + + + + + + + + + + + + + + + @@ -29118,70 +36469,88 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + @@ -29190,64 +36559,82 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + @@ -29256,405 +36643,433 @@

    refers to risk

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - -
    -
    -

    DPV uses the following terms from [[RDF]] and [[RDFS]] with their defined meanings:

    -
      -
    • rdf:type to denote a concept is an instance of another concept
    • -
    • rdfs:Class to denote a concept is a Class or a category
    • -
    • rdfs:subClassOf to specify the concept is a subclass (subtype, sub-category, subset) of another concept
    • -
    • rdf:Property to denote a concept is a property or a relation
    • -
    -

    The following external concepts are re-used within DPV:

    -

    External

    - + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + - + @@ -29669,58 +37084,47 @@

    External

    - - - - - - - - + - - - - - + - + @@ -29737,6 +37141,7 @@

    External

    + @@ -29752,138 +37157,134 @@

    External

    - - - - - + - + - - - - + - - - + - - + - + - + + + - + - + - - + + + + + + + + - - - + @@ -29901,59 +37302,99 @@

    External

    - - - - + - - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -29976,6 +37417,7 @@

    External

    + @@ -29984,7 +37426,6 @@

    External

    - @@ -30120,6 +37561,7 @@

    External

    + @@ -30159,17 +37601,11 @@

    External

    - - - - - - @@ -30185,6 +37621,7 @@

    External

    + @@ -30218,88 +37655,86 @@

    External

    - + - - + - + - - - - + - - - - + + + + + + - + - + - + - + - + @@ -30308,31 +37743,31 @@

    External

    - + - + - + - + - + @@ -30341,220 +37776,178 @@

    External

    - - + - + - - - - + - - - + + - + - - - - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - + - - - - + - - + - - - @@ -30578,22 +37971,37 @@

    External

    + + + + + + + + + + + + + + + @@ -30634,5 +38042,69 @@

    Funding Acknowledgements for Contributors

    + \ No newline at end of file diff --git a/2.1-dev/risk/risk.jsonld b/2.1-dev/risk/risk.jsonld index cedfb1f28..1c4564b40 100644 --- a/2.1-dev/risk/risk.jsonld +++ b/2.1-dev/risk/risk.jsonld @@ -1,31 +1,18 @@ [ { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#Racism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndf05e8ac43fb44f994f8ab3ba8f8b7b6" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -41,49 +28,83 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Prejudice or discrimination against people based on their race" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Racism" } ] }, { - "@id": "_:Ndf05e8ac43fb44f994f8ab3ba8f8b7b6", + "@id": "https://w3id.org/dpv/risk#ContainmentControl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to contain event" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -93,7 +114,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -102,11 +123,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb72f9b0d54644d6ab338feaa339c1f40" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -120,67 +136,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" - } - ] - }, - { - "@id": "_:Nb72f9b0d54644d6ab338feaa339c1f40", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk#CoverageBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.20,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -196,33 +203,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "Coverage Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk#IncidentMitigated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -232,12 +239,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.06,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -253,47 +255,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk#isExploitedBy", + "@id": "https://w3id.org/dpv/risk#NonNormalityBias", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -307,40 +314,39 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Non-Normality Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -350,7 +356,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N809a964650274e1ca9c544fb513732ef" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -366,37 +383,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", + "@id": "_:N809a964650274e1ca9c544fb513732ef", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -406,7 +444,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -417,47 +455,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Confidentiality Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk#NonResponseBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na877a19c74e2458baac027fd4dcf4457" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -465,11 +514,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -478,65 +522,105 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" + "@value": "Non-Response Bias" } ] }, { - "@id": "_:Na877a19c74e2458baac027fd4dcf4457", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "IEC 31010:2019" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.44,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -552,43 +636,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Extremely High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Discrimination", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -597,6 +690,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndd18bed776ec45498b139828923f57f1" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -610,39 +708,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Lose of Opportunity" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", + "@id": "_:Ndd18bed776ec45498b139828923f57f1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -651,27 +775,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Health & Safety" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@id": "https://w3id.org/dpv/risk#IncidentTerminated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -681,7 +811,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -697,54 +827,73 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "https://w3id.org/dpv/risk#serialisation-html", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "_:N25ef844a62984a848306d378b71152be" + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -758,51 +907,38 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:N25ef844a62984a848306d378b71152be", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "caused by threat" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -815,9 +951,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.60,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -833,49 +975,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-properties", + "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + } ] }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#Sexism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -891,33 +1041,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Sexism" } ] }, { - "@id": "https://w3id.org/dpv/risk#Privacy", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -932,23 +1085,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#Misuse" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@language": "en", + "@value": "Intentional Misuse" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -967,7 +1126,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.73,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -983,13 +1142,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1000,32 +1159,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataProcessingBias", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1041,33 +1199,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Processing Bias" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1080,15 +1238,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb1e4985890f24fbab83393e2ff718b69" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1104,55 +1256,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" - } - ] - }, - { - "@id": "_:Nb1e4985890f24fbab83393e2ff718b69", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1162,12 +1292,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1183,41 +1313,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1234,11 +1352,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1252,13 +1365,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1269,22 +1382,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-status-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1294,12 +1401,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.01,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1315,55 +1422,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1379,33 +1474,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -1426,7 +1524,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc28ea8a295b445aca739a464f287a77a" + "@id": "_:N4f1e8d9a5f314a419875e658936b3a20" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1442,71 +1540,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:Nc28ea8a295b445aca739a464f287a77a", + "@id": "_:N4f1e8d9a5f314a419875e658936b3a20", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk#UserRisks", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1521,33 +1599,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1557,12 +1639,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.01,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N70af67194f054cbcbe4d1d616683423b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1578,96 +1666,97 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" + "@value": "Coercion" } + ] + }, + { + "@id": "_:N70af67194f054cbcbe4d1d616683423b", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialLoss" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1680,9 +1769,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.29,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nadd5922c22574bd38879939155a85ae3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1698,29 +1793,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", + "@id": "_:Nadd5922c22574bd38879939155a85ae3", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1761,7 +1872,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1772,20 +1883,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk#hasVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -1805,35 +1915,37 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -1843,12 +1955,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1864,38 +1982,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" + "@value": "Copyright Violation" + } + ] + }, + { + "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1912,11 +2037,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1930,13 +2050,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1947,57 +2067,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "External Security Threat" + "@value": "0.18,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2012,82 +2107,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ThreatSource", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.14,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2096,26 +2162,31 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2134,7 +2205,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2150,13 +2221,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2167,16 +2238,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2189,9 +2263,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.22,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2207,33 +2287,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2248,49 +2360,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonNormalityBias", + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-06-11" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2306,49 +2427,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Normality Bias" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBias", + "@id": "https://w3id.org/dpv/risk#GeographicDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2364,48 +2477,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Bias" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + "@value": "Discrimination based on a person's geographical origin or residence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Bias" + "@value": "Geographic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowSeverity", + "@id": "https://w3id.org/dpv/risk#hasIncident", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2419,47 +2526,38 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" + "@value": "has incident" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@id": "https://w3id.org/dpv/risk#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -2480,7 +2578,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8e471129d82f468fbaa272011c8a10f7" + "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2496,38 +2594,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - }, - { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:N8e471129d82f468fbaa272011c8a10f7", + "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd", "@type": [ "https://schema.org/WebPage" ], @@ -2543,28 +2632,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "https://w3id.org/dpv/risk#RightObstructed", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2579,44 +2654,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Interference with or blocking of the exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Obstruction of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#SourceControl", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2631,37 +2703,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -2670,10 +2742,9 @@ "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2689,35 +2760,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Moderate Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2736,7 +2813,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2758,7 +2835,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2769,36 +2846,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskSource", + "@id": "https://w3id.org/dpv/risk#Bias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2809,29 +2890,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2850,7 +2931,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2872,7 +2953,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2883,37 +2964,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#RequirementsBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na8ee3a054aaf49f89103a7f1af68d1c7" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2929,74 +3008,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" - } - ] - }, - { - "@id": "_:Na8ee3a054aaf49f89103a7f1af68d1c7", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Requirements Bias" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3012,33 +3080,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Out-Group Homogeneity Bias" + "@value": "Psychological Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3059,7 +3147,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6dd3fbc8f83f432bac55bbdc7b5f2fcc" + "@id": "_:N4a6ecf056dcd484394a81241d36bbc29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3075,91 +3163,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Identity Theft" } ] }, { - "@id": "_:N6dd3fbc8f83f432bac55bbdc7b5f2fcc", + "@id": "_:N4a6ecf056dcd484394a81241d36bbc29", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "accepted" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#bias-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "_:Neee39564ca4e493181200a260513b3de" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3167,11 +3238,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3180,33 +3246,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "_:Neee39564ca4e493181200a260513b3de", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3227,7 +3313,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9017bb64e79f426e9b3be47b09cd93ea" + "@id": "_:N95204127ed924036926f89eb7e5b0678" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3243,67 +3329,106 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N9017bb64e79f426e9b3be47b09cd93ea", + "@id": "_:N95204127ed924036926f89eb7e5b0678", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk#Harassment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Harassment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.1,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3319,42 +3444,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Group Attribution Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3367,15 +3483,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N9a05f8103f334714ae1d17fd74ba0730" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3391,64 +3501,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "_:N9a05f8103f334714ae1d17fd74ba0730", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@id": "https://w3id.org/dpv/risk#LegalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3463,33 +3544,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3510,7 +3595,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncae32b67116f4739be7418755cf32050" + "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3526,58 +3611,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:Ncae32b67116f4739be7418755cf32050", + "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3590,15 +3666,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2b8d3c26b0564a5aa45b8e322c1f789d" + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3614,73 +3684,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "_:N2b8d3c26b0564a5aa45b8e322c1f789d", + "@id": "https://w3id.org/dpv/risk#isExploitedBy", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/url": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Threat" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.44,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3694,35 +3738,40 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "is exploited by" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3732,12 +3781,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3753,39 +3802,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3798,15 +3841,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7b4acd3bba614ee3a2824e835f2e662d" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3822,55 +3859,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N7b4acd3bba614ee3a2824e835f2e662d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorImpact", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3880,7 +3895,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3896,43 +3916,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3948,33 +3977,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk#IndividualRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3987,35 +4018,30 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4025,7 +4051,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4041,33 +4072,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4077,7 +4108,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4093,33 +4129,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4132,15 +4168,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbef628fe676e4c9cba3d4a0a1f5c38f0" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4156,58 +4186,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:Nbef628fe676e4c9cba3d4a0a1f5c38f0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4228,7 +4238,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N04c587cd11ad4a1396432371d68b3776" + "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4244,68 +4254,62 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Unauthorised System Access" } ] }, { - "@id": "_:N04c587cd11ad4a1396432371d68b3776", + "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -4327,32 +4331,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Compensation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4371,7 +4372,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4387,13 +4388,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4404,31 +4405,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk#DirectDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.36,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4444,49 +4438,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Direct Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4502,48 +4495,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Group Attribution Bias" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.40,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4559,55 +4556,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Simpson'S Paradox Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.61,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4622,29 +4600,23 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4663,7 +4635,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4685,7 +4657,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4696,20 +4668,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityIncident", + "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4717,11 +4695,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -4730,56 +4703,1560 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk#ShareRisk", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, { - "@id": "https://w3id.org/dpv/risk#" + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "accepted" - } - ], + "@value": "Delaram Golpayegani" + }, + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Incident" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Risk (RM7x7 S:1 L:4)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LowRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Risk is Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SocietalBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM5x5 S:3 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PotentialRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates a concept can potentially be a 'risk' concept within an use-case" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Potential Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.51,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM7x7 S:5 L:5)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InformativenessBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Informativeness Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Identifier associated with an incident" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Identifier" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nedb073eb260845019e04df25c90d654e" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Security Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Security Breach" + } + ] + }, + { + "@id": "_:Nedb073eb260845019e04df25c90d654e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentConcluded", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Concluded" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 20501:2019" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Statistical Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConsequenceControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risk Mitigation Measure that controls the Consequences" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Consequence Control" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Detriment", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#LegalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Detriment" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Detriment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#ThreatSource" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the threat (subject) has the indicated source (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has threat source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#ThreatSource" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReductionControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the likelihood or severity of an event" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reduction Control" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.37,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Risk (RM7x7 S:3 L:6)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N24492f14343b4b90bddc2673a3b6d932" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Resource Use" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Resource Use" + } + ] + }, + { + "@id": "_:N24492f14343b4b90bddc2673a3b6d932", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" + } + ] + }, + { + "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RecoveryControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], "http://www.w3.org/2004/02/skos/core#broader": [ { "@id": "https://w3id.org/dpv/risk#RiskControl" @@ -4788,7 +6265,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4799,33 +6276,78 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#StatisticalBias", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "ISO 20501:2019" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM5x5 S:1 L:5)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4840,29 +6362,136 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Statistical Bias" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentRegister", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A register recording incidentes, their reports, notifications, and other related activities" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Register" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4892,13 +6521,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4909,12 +6538,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4933,7 +6562,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4949,13 +6578,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4966,20 +6595,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4987,9 +6627,65 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InGroupBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5000,29 +6696,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5041,7 +6737,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5057,13 +6753,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5074,67 +6770,50 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Threat", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#RiskSource" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Threat" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -5155,7 +6834,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf35def6f3fcb44a2820a83d08bc67c28" + "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5171,52 +6850,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Terrorism" } ] }, { - "@id": "_:Nf35def6f3fcb44a2820a83d08bc67c28", + "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5226,12 +6902,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5247,66 +6923,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConfirmationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6d8138abcff943f68df0ab565a04a650" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5322,52 +6990,100 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Confirmation Bias" } ] }, { - "@id": "_:N6d8138abcff943f68df0ab565a04a650", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RightsImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -5377,18 +7093,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N27e59086791f4c86980cec9fada4a055" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5404,62 +7114,50 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:N27e59086791f4c86980cec9fada4a055", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Very High Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5475,47 +7173,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "SexualOrientation Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.67,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5526,33 +7230,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -5562,7 +7268,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5573,38 +7290,71 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", + "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReduceSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5619,27 +7369,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ReductionControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5649,7 +7409,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5665,33 +7436,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5712,7 +7504,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N20794ebbd2e449b2942f8e678d291698" + "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5728,65 +7520,97 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Malware Attack" } ] }, { - "@id": "_:N20794ebbd2e449b2942f8e678d291698", + "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfirmationBias", + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5802,39 +7626,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confirmation Bias" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", + "@id": "https://w3id.org/dpv/risk#AccidentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5843,33 +7677,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5879,7 +7713,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5895,33 +7734,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5931,12 +7770,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.01,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5952,35 +7791,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5999,7 +7832,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6015,13 +7848,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6032,16 +7865,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRisk", + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -6051,7 +7883,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6059,6 +7891,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6067,33 +7904,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Indicates a concept is relevant to 'Availability' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Availability Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -6103,18 +7946,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N62b691f43380412c8a12872ca763719c" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6130,45 +7962,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:N62b691f43380412c8a12872ca763719c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6203,13 +8019,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6220,16 +8036,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk#RiskMatrix", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAssessment" ], "http://purl.org/dc/terms/contributor": [ { @@ -6242,6 +8058,11 @@ "@value": "2024-02-14" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3a914addd1624a6ab69826c81a0b0778" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6255,29 +8076,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Risk Matrix" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNotice", + "@id": "_:N3a914addd1624a6ab69826c81a0b0778", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Vulnerability", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -6285,7 +8122,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6295,7 +8132,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#Notice" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6304,35 +8141,34 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6353,7 +8189,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd579b76a185748d39a9c8fd295a32c6b" + "@id": "_:Nd268380dc1f84dea9ec58ef31331c264" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6364,40 +8200,34 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Scam" } ] }, { - "@id": "_:Nd579b76a185748d39a9c8fd295a32c6b", + "@id": "_:Nd268380dc1f84dea9ec58ef31331c264", "@type": [ "https://schema.org/WebPage" ], @@ -6413,11 +8243,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk#3SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -6427,12 +8257,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6448,33 +8273,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -6484,21 +8309,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0050e9c8fb8e444391c01a99db38961a" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2cdfbe07952b4ea9847ac6e4cc259d4e" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6514,74 +8330,143 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "_:N0050e9c8fb8e444391c01a99db38961a", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Risk" } ] }, { - "@id": "_:N2cdfbe07952b4ea9847ac6e4cc259d4e", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.80,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#AvoidSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -6591,18 +8476,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc55af031139a488e867f0d2fc7f4752c" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6618,59 +8492,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:Nc55af031139a488e867f0d2fc7f4752c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskManagement", + "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6680,7 +8537,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6689,46 +8546,38 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#ImpactAssessment" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6743,32 +8592,27 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatus", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6778,12 +8622,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6791,11 +8635,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Status" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6804,53 +8643,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Status" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk#IncidentNotice", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.48,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6861,33 +8694,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -6897,18 +8730,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N95637668b675461d9d1c70e1c8be8586" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6924,80 +8751,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "Extremely High Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here equipment refers to physical equipment" - } - ] - }, - { - "@id": "_:N95637668b675461d9d1c70e1c8be8586", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "https://w3id.org/dpv/risk#SelectionBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "DGA 2.10" + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7008,54 +8813,53 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Selection Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7071,35 +8875,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7118,7 +8916,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7134,13 +8932,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7151,12 +8949,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -7191,7 +8989,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7202,16 +9000,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -7221,18 +9019,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N012ac588a7e54adeb3318a3bcf249184" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7248,58 +9040,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" + "@value": "Extremely High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:N012ac588a7e54adeb3318a3bcf249184", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvoidSource", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -7309,7 +9082,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7325,33 +9103,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7364,9 +9147,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.04,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N05a9ed7355894f6bb37c02c33f9226da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7382,29 +9171,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", + "@id": "_:N05a9ed7355894f6bb37c02c33f9226da", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7423,7 +9228,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7445,7 +9250,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7456,16 +9261,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#IntegrityConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -7475,23 +9279,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-29" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N122614f9d61546d49ba0e04b92558751" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7502,65 +9300,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" - } - ] - }, - { - "@id": "_:N122614f9d61546d49ba0e04b92558751", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Integrity Concept" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#CognitiveBias", + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7576,53 +9358,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Bias" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when humans are processing and interpreting information" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cognitive Bias" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.80,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7633,48 +9409,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk#ReligiousDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.51,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7690,49 +9459,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Discrimination based on a person's religious beliefs or practices" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Religious Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#SelectionBias", + "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7748,53 +9516,56 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Selection Bias" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.37,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7805,33 +9576,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -7840,13 +9611,8 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7862,35 +9628,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7909,7 +9669,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.18,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7925,13 +9685,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7942,12 +9702,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7988,7 +9748,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7999,37 +9759,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#PotentialImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-09-29" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8040,54 +9798,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Indicates a concept can potentially be a 'impact' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Potential Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#hasRiskSource", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv#Risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N656bab82b34a40c7be08764bd11edd1d" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8101,51 +9858,45 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "has risk source" } - ] - }, - { - "@id": "_:N656bab82b34a40c7be08764bd11edd1d", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv#Risk" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8158,6 +9909,17 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N366da704654a4b4682d8de807d0f1bef" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8171,49 +9933,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", + "@id": "_:N366da704654a4b4682d8de807d0f1bef", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8229,53 +10006,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rule-Based System Design" + "@value": "Very Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@id": "https://w3id.org/dpv/risk#ImpactControl", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Risk" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8289,36 +10065,31 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8337,7 +10108,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8359,7 +10130,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8370,21 +10141,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReductionControl", + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8395,38 +10184,60 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@language": "en", - "@value": "Reduction Control" + "@language": "en", + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8436,12 +10247,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8457,55 +10268,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactControl", + "@id": "https://w3id.org/dpv/risk#CognitiveBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8521,33 +10329,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#Bias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Bias that occurs when humans are processing and interpreting information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Cognitive Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#AgeDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8562,42 +10379,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Discrimination based on a person's age, often impacting older or younger individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Age Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk#7RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -8607,12 +10415,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8628,33 +10431,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8675,7 +10482,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N793f312abfaf4de08ee115cf262f3de4" + "@id": "_:N636eafbaa808469aa226aaa74ca74855" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8691,35 +10498,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" + "@value": "Intercept Communications" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N793f312abfaf4de08ee115cf262f3de4", + "@id": "_:N636eafbaa808469aa226aaa74ca74855", "@type": [ "https://schema.org/WebPage" ], @@ -8735,11 +10542,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk#IncidentOngoing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -8749,12 +10556,57 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.86,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The incident is ongoing i.e. still active" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Ongoing" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Misogyny", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8770,33 +10622,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Dislike, contempt, or prejudice against women" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Misogyny" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8809,15 +10661,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ncd20b2bc13904da294945c80012f45d5" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8833,49 +10679,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:Ncd20b2bc13904da294945c80012f45d5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8888,9 +10722,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.20,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb81ef67053e949d7a297791513c8eab8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8906,42 +10746,79 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasIncident", + "@id": "_:Nb81ef67053e949d7a297791513c8eab8", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "ENISa Trust Services Security Incidents 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#core-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Discrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-19" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8955,50 +10832,52 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#RiskConcept" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Something that acts as or causes Discrimination" + }, + { + "@language": "en", + "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk#RiskAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.16,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9006,6 +10885,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskManagement" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -9014,33 +10898,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk#HighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -9050,12 +10934,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.64,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9071,33 +10955,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -9107,7 +11009,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9123,33 +11025,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhishingScam", + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9170,7 +11078,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2efc2f4438a54dda98fe4b524a7e2ec9" + "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9186,48 +11102,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Data Breach" } ] }, { - "@id": "_:N2efc2f4438a54dda98fe4b524a7e2ec9", + "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9246,7 +11159,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.02,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9268,7 +11181,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9279,16 +11192,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9301,15 +11214,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1c8ddcb560fa424ca1fe76db29a31820" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9325,64 +11232,102 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "_:N1c8ddcb560fa424ca1fe76db29a31820", + "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "https://schema.org/url": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "exploits vulnerability" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk#LanguageDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.86,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9398,62 +11343,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Language Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "_:Nab5c54b7fa1f4b298dba1eea5aac93db" + "@id": "https://w3id.org/dpv/examples" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentHalted", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9469,64 +11426,34 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:Nab5c54b7fa1f4b298dba1eea5aac93db", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk#DetectionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -9552,7 +11479,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9563,47 +11490,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk#3RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -9613,18 +11509,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2272c3af1d7c4f35878b97cbb8cca1c6" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9635,60 +11520,43 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N2272c3af1d7c4f35878b97cbb8cca1c6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9709,7 +11577,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1a900148ee964d84bdb0f1dbecd9c525" + "@id": "_:Nd6abb4f630e44551bf502809758f49c1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9725,29 +11593,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Sabotage" } ] }, { - "@id": "_:N1a900148ee964d84bdb0f1dbecd9c525", + "@id": "_:Nd6abb4f630e44551bf502809758f49c1", "@type": [ "https://schema.org/WebPage" ], @@ -9763,21 +11631,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#7RiskLevels", + "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9785,6 +11647,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -9793,52 +11660,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv#Incident" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv#Risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@id": "_:N8a73cba67e0045688727d0972f8b70f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9852,40 +11725,56 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" + "@value": "Compromise Account Credentials" } + ] + }, + { + "@id": "_:N8a73cba67e0045688727d0972f8b70f6", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv#Incident" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9906,7 +11795,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8894f1e1a7aa41ba9422beb0723f99a2" + "@id": "_:Ne12951e4dd044f82839888833ef1ed00" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9922,32 +11811,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:N8894f1e1a7aa41ba9422beb0723f99a2", + "@id": "_:Ne12951e4dd044f82839888833ef1ed00", "@type": [ "https://schema.org/WebPage" ], @@ -9963,11 +11849,17 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk#incident-status-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9980,15 +11872,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N9f3682987581455e985c74cb431bb163" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10004,69 +11890,61 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "_:N9f3682987581455e985c74cb431bb163", + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10077,68 +11955,73 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Public Order Breach" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/format": [ + "https://schema.org/url": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Injury", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/examples" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10146,11 +12029,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10159,29 +12037,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", + "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10200,7 +12094,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10222,7 +12116,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10233,12 +12127,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10257,7 +12151,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10274,15 +12168,12 @@ "http://www.w3.org/2004/02/skos/core#broader": [ { "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10293,22 +12184,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "Extremely Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk#LowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -10318,18 +12209,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6526b82722164e0ba82d77115e7cee0f" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10345,73 +12230,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:N6526b82722164e0ba82d77115e7cee0f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Low Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk#Transphobia", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10427,39 +12292,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Transphobia" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAssessment" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -10469,12 +12330,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N07141469efbe4cf08bef9803f87f84f2" + "@id": "_:N01592d7a5ed64907a324ef43ea425e66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10485,76 +12352,63 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N07141469efbe4cf08bef9803f87f84f2", + "@id": "_:N01592d7a5ed64907a324ef43ea425e66", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "IEC 31010:2019" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N942a7e9ba5ea4c138c2a2501ac4c3868" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10569,68 +12423,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ] - }, - { - "@id": "_:N942a7e9ba5ea4c138c2a2501ac4c3868", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10639,47 +12464,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk#DataAggregationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10690,33 +12525,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -10729,15 +12564,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N39150275e13e448ba6b444f5156835f5" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10753,68 +12582,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N39150275e13e448ba6b444f5156835f5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10830,33 +12639,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk#RemoveImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -10866,12 +12675,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10887,33 +12691,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk#IncidentSuspected", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -10923,12 +12727,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10944,118 +12743,133 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#RightsDenial", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "_:N66f90f2dfdfb46e087830f6c7a2c3ad0" + "@language": "en", + "@value": "The refusal or withholding or denial of the existence or applicability of rights" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "accepted" + "@value": "Denial of Rights" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, + "@language": "en", + "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CasteDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" } - ] - }, - { - "@id": "_:N66f90f2dfdfb46e087830f6c7a2c3ad0", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Caste Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11068,15 +12882,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6dc4efe43a844bbe94810084460a3ca2" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11092,48 +12900,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ] - }, - { - "@id": "_:N6dc4efe43a844bbe94810084460a3ca2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11152,7 +12941,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11174,7 +12963,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11185,31 +12974,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11225,48 +13018,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Renumeration" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11282,39 +13079,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Renumeration" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11323,33 +13130,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHalted", + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -11359,7 +13169,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11375,33 +13196,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -11422,7 +13261,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na5624c595653415e824cac1cae35b841" + "@id": "_:N8626c0b412094a41834e4fa199b449f9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11438,65 +13277,80 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:Na5624c595653415e824cac1cae35b841", + "@id": "_:N8626c0b412094a41834e4fa199b449f9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#InformativenessBias", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11512,38 +13366,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Informativeness Bias" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorConsequence", + "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -11556,6 +13420,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11564,44 +13433,34 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11616,79 +13475,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk#RiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.57,xsd:decimal" + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11696,6 +13518,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11704,39 +13531,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemedyControl", + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11751,49 +13574,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11809,33 +13631,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11856,7 +13683,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N23726cdea0d14630a4ffe4716dcd4526" + "@id": "_:N174281b4f06940a18a9e6519d98fa3e3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11872,71 +13699,73 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "System Intrusion" } ] }, { - "@id": "_:N23726cdea0d14630a4ffe4716dcd4526", + "@id": "_:N174281b4f06940a18a9e6519d98fa3e3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-04-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11947,39 +13776,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11988,42 +13827,59 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N45e627abb33f484ea319253eb043bcd9" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12038,88 +13894,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@id": "_:N45e627abb33f484ea319253eb043bcd9", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Vulnerability" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12132,9 +13953,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.29,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12145,42 +13972,68 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#DeliberateIncident", + "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NationalityDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12188,11 +14041,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12201,48 +14049,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Discrimination based on a person's nationality or citizenship" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Nationality Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.16,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12258,48 +14110,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk#SexDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12315,38 +14160,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Discrimination based on a person's biological sex" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Sex Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12365,7 +14201,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12381,13 +14217,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12398,16 +14234,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -12417,13 +14253,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12439,39 +14274,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -12481,12 +14310,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12502,33 +14326,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -12538,7 +14365,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -12547,6 +14374,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -12560,51 +14392,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Human Errors" } + ] + }, + { + "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@id": "https://w3id.org/dpv/risk#ImplicitBias", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12618,35 +14467,70 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" + "@value": "Implicit Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -12656,12 +14540,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12672,265 +14562,261 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" + "@value": "Violation of Contractual Obligation" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "https://schema.org/name": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "https://schema.org/url": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Daniel Doherty" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Rob Brennan" - }, - { - "@value": "Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "0.33,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Julian Flake" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "High Risk (RM7x7 S:4 L:4)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2024-08-18" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://www.w3.org/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "_:N72f880006766453c8c5284ca9a8c23ae" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Risk Concepts" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "10.5281/zenodo.12505841" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "risk" + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" + "@value": "Unauthorised Information Disclosure" } + ] + }, + { + "@id": "_:N72f880006766453c8c5284ca9a8c23ae", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "@value": "0.24,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv" + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12943,9 +14829,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.80,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb72c07b7fa024bcf85183796d36738b4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12961,33 +14853,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Blackmail" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", + "@id": "_:Nb72c07b7fa024bcf85183796d36738b4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -13000,9 +14911,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.14,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13018,42 +14935,59 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByVulnerability", + "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Likelihood" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13067,35 +15001,38 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#Likelihood" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -13104,8 +15041,19 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N625f03306b04496198a17a1c1fc9f2cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13121,32 +15069,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Financial Loss" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentRegister", + "@id": "_:N625f03306b04496198a17a1c1fc9f2cc", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -13164,11 +15135,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13177,54 +15143,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImplicitBias", + "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13235,54 +15194,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Implicit Bias" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "https://w3id.org/dpv/risk#PotentialRiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-29" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13293,38 +15250,44 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Indicates a concept can potentially be a 'risk source' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Potential RiskSource" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk#HaltSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { @@ -13337,11 +15300,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13350,35 +15308,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13397,7 +15349,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13413,13 +15365,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13430,26 +15382,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13457,6 +15403,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13465,33 +15416,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13504,15 +15455,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb08320fce6334ebaa9882de0de363138" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13528,49 +15473,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:Nb08320fce6334ebaa9882de0de363138", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13583,15 +15512,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6e1595afe0144aeea2b1f55d8136d0cc" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13607,65 +15530,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:N6e1595afe0144aeea2b1f55d8136d0cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk#MaliciousActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.43,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13680,33 +15574,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Malicious Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13727,7 +15625,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N27860d33acdb4a848f2b279c6f777606" + "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13738,63 +15636,70 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N27860d33acdb4a848f2b279c6f777606", + "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.61,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13809,33 +15714,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13856,7 +15765,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbad0a27eb07e4428a3a5c2e24515e416" + "@id": "_:N9d18ac853d6249008536496d60a088cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13872,71 +15781,97 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" + "@value": "Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:Nbad0a27eb07e4428a3a5c2e24515e416", + "@id": "_:N9d18ac853d6249008536496d60a088cd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk#core-properties", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "Guides for Data Privacy Vocabulary" } ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -13948,40 +15883,41 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Component Malfunction" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "https://w3id.org/dpv/risk#MonitorControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -13991,13 +15927,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14013,54 +15943,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" + "@value": "Monitor Control" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk#causedByVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14074,44 +15998,41 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" + "@value": "caused by vulnerability" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14132,7 +16053,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b3cae72c654fbba38a4121d80d0971" + "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14148,29 +16069,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:N12b3cae72c654fbba38a4121d80d0971", + "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee", "@type": [ "https://schema.org/WebPage" ], @@ -14186,21 +16107,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk#ThreatSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14208,37 +16123,37 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveSource", + "@id": "https://w3id.org/dpv/risk#ChangeImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14268,13 +16183,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14285,47 +16200,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -14346,7 +16233,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nce763ffd88464838a749b691f0ba814e" + "@id": "_:N58c7a823728a4bbc929c09b50030b836" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14362,52 +16249,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Lose of Trust" } ] }, { - "@id": "_:Nce763ffd88464838a749b691f0ba814e", + "@id": "_:N58c7a823728a4bbc929c09b50030b836", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14420,15 +16304,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N341572353447495784d70c873b300d32" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14444,68 +16322,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" - } - ] - }, - { - "@id": "_:N341572353447495784d70c873b300d32", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#InGroupBias", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-19" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14521,33 +16384,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "In-Group Bias" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14560,15 +16423,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nd42bbf88bc3c4a50bd0d7b206c79060e" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14584,65 +16441,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" - } - ] - }, - { - "@id": "_:Nd42bbf88bc3c4a50bd0d7b206c79060e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CoverageBias", + "@id": "https://w3id.org/dpv/risk#MonitorImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14658,24 +16493,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coverage Bias" + "@value": "Monitor Impact" } ] }, @@ -14684,7 +16519,10 @@ "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -14716,7 +16554,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#Renumeration" } ], "http://www.w3.org/2004/02/skos/core#definition": [ @@ -14727,7 +16565,7 @@ ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ @@ -14738,11 +16576,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14752,7 +16590,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14768,33 +16611,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Terminated" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#Harm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -14804,7 +16650,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-13" } ], "http://purl.org/dc/terms/modified": [ @@ -14813,11 +16659,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc56cc965e12d4f8a86473ed790bd98d0" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -14831,64 +16672,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" - } - ] - }, - { - "@id": "_:Nc56cc965e12d4f8a86473ed790bd98d0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Harm" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk#EthnicDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.43,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14904,33 +16728,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Racism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Ethnic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14943,15 +16767,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N127f18629c20469393a6ea549f6434c3" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14967,49 +16785,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" - } - ] - }, - { - "@id": "_:N127f18629c20469393a6ea549f6434c3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk#ModerateRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -15019,12 +16821,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15040,29 +16842,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Moderate Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15081,7 +16895,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15103,7 +16917,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15114,12 +16928,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk#RemoveSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15149,13 +16963,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15166,16 +16980,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15196,7 +17013,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N67d2f9f89fab439b8d5965d26bb49159" + "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15212,32 +17029,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N67d2f9f89fab439b8d5965d26bb49159", + "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57", "@type": [ "https://schema.org/WebPage" ], @@ -15253,62 +17067,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Ongoing Report" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk#HighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -15318,7 +17081,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15334,33 +17102,50 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15381,7 +17166,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neaf661678b58453aa79ac68fa97e26ba" + "@id": "_:Nc32ca360a68540de9b7d635beec8d66a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15397,62 +17182,56 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:Neaf661678b58453aa79ac68fa97e26ba", + "@id": "_:Nc32ca360a68540de9b7d635beec8d66a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#SamplingBias", + "@id": "https://w3id.org/dpv/risk#DataProcessingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -15480,33 +17259,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data records are not collected randomly from the intended population" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sampling Bias" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk#HighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15521,24 +17316,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk#LowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -15548,12 +17364,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15569,50 +17385,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15627,33 +17441,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15674,7 +17492,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nca552bddc5ac4825af27bacd7089da63" + "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15689,9 +17507,6 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -15699,45 +17514,45 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:Nca552bddc5ac4825af27bacd7089da63", + "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorControl", + "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15767,13 +17582,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15784,26 +17599,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk#IndirectDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15811,11 +17624,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15824,33 +17632,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Indirect Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -15860,18 +17668,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N755a8b0a576543d3877fe747628c7919" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15887,72 +17689,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:N755a8b0a576543d3877fe747628c7919", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Extremely Low Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk#IntegrityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.61,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15963,48 +17746,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasControl", + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0071" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16017,35 +17788,38 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Misuse" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk#SexualViolence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -16066,7 +17840,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N50b49b49a3fe4b1ea591c004b74b4453" + "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16082,32 +17856,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Sexual Violence" } ] }, { - "@id": "_:N50b49b49a3fe4b1ea591c004b74b4453", + "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3", "@type": [ "https://schema.org/WebPage" ], @@ -16123,57 +17894,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Identifier associated with an incident" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Identifier" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "https://w3id.org/dpv/risk#VeryHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -16183,18 +17908,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb67e1cacb9d546a69a306d5c1e8456d9" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16205,79 +17924,57 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" + "@value": "Very High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nb67e1cacb9d546a69a306d5c1e8456d9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalBias", + "@id": "https://w3id.org/dpv/risk#SourceControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16293,39 +17990,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Bias" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16338,15 +18029,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7c1ceabcaad149f28fb40302094cf3a4" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16362,55 +18047,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } - ] - }, - { - "@id": "_:N7c1ceabcaad149f28fb40302094cf3a4", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#HaltSource", + "@id": "https://w3id.org/dpv/risk#Reidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16420,7 +18087,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16436,24 +18109,30 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, @@ -16543,6 +18222,57 @@ } ] }, + { + "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Documented information about an incident, its handling, assessments,and notifications" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Report" + } + ] + }, { "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", "@type": [ @@ -16601,42 +18331,65 @@ ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#RightsUnfulfilled", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "Failure to meet or complete the fulfilment of rights" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unfulfilment of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sabotage", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16657,7 +18410,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N42dd6eab89e5476c8ce82ee556bb8a47" + "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16673,55 +18426,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:N42dd6eab89e5476c8ce82ee556bb8a47", + "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -16731,12 +18480,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16747,47 +18502,66 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" + "@value": "Violating Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", + "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16800,9 +18574,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.37,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N01f7495831e241abad48b454e2462d19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16818,99 +18598,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Compromise Account" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", + "@id": "_:N01f7495831e241abad48b454e2462d19", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowRisk", + "@id": "https://w3id.org/dpv/risk#RemedyControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16926,41 +18661,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16979,7 +18702,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17001,7 +18724,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17012,33 +18735,33 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://www.w3.org/TR/json-ld11/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Risk Concepts - JSON-LD serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@id": "https://w3id.org/dpv/risk/risk.jsonld" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -17048,11 +18771,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk#incident-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -17062,7 +18795,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17078,39 +18822,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk#ContainmentControl", + "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17125,29 +18888,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskControl", + "@id": "https://w3id.org/dpv/risk#RiskManagement", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -17155,12 +18918,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-06-12" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17170,7 +18934,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17179,51 +18943,54 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonResponseBias", + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17239,33 +19006,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Response Bias" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ModerateSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17280,43 +19079,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Moderate Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -17338,54 +19152,97 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Homophobia", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Homophobia" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk#GenderDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17401,48 +19258,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Discrimination based on a person's gender identity or gender expression" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "Gender Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowLikelihood", + "@id": "https://w3id.org/dpv/risk#ExcellenceDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17458,45 +19308,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Excellence Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@id": "https://w3id.org/dpv/risk#DisabilityDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17511,63 +19358,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Discrimination against individuals based on physical or mental disabilities" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Disability Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", + "@id": "https://w3id.org/dpv/risk#DeliberateIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17578,49 +19409,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confounding Variables Bias" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "https://w3id.org/dpv/risk#RiskAnalysis", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17628,6 +19457,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -17636,33 +19470,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels", + "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -17672,7 +19522,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17688,48 +19538,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk#Misandry", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17745,29 +19588,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Dislike, contempt, or prejudice against men" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Misandry" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17786,7 +19629,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17808,7 +19651,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17819,38 +19662,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#SexualHarassment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#Harm" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:Nf44facc76ca548efac72ec065d8591cd" + "@language": "en", + "@value": "Sexual Harassment" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RightEroded", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17865,64 +19727,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "The gradual weakening or reduction of the scope and protection of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" - } - ] - }, - { - "@id": "_:Nf44facc76ca548efac72ec065d8591cd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Erosion of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk#ChangeConsequence", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17936,31 +19783,31 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17979,7 +19826,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18001,7 +19848,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18012,16 +19859,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -18042,7 +19892,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb78ad830eb9c4d65a06a2a0dac398849" + "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18053,60 +19903,60 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Exposure to Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Nb78ad830eb9c4d65a06a2a0dac398849", + "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighLikelihood", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -18116,12 +19966,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18137,50 +19987,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DetectionControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18196,32 +20044,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -18234,30 +20103,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#LegalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#VeryLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -18267,18 +20141,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nf54ab9e109634d149cb207471dd2ffc5" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18294,55 +20162,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:Nf54ab9e109634d149cb207471dd2ffc5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "Very Low Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "https://w3id.org/dpv/risk#PotentialConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -18352,23 +20206,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-29" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N8bc9357378f0418c87e2c89b8f5a58b6" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18379,52 +20227,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Indicates a concept can potentially be a 'consequence concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" - } - ] - }, - { - "@id": "_:N8bc9357378f0418c87e2c89b8f5a58b6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Potential Consequence" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18437,9 +20276,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.33,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18455,48 +20300,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", + "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.71,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18504,6 +20354,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -18512,34 +20367,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk#RecoveryControl", + "@id": "https://w3id.org/dpv/risk#RemoveConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -18559,13 +20419,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18576,36 +20436,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "Remove Consequence" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.60,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18616,33 +20470,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18655,9 +20513,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18673,33 +20537,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", + "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -18709,12 +20589,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18730,33 +20605,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -18766,7 +20644,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N60882207c25442eab9509dc96896d91a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18782,50 +20671,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Erroneous System Use" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataAggregationBias", + "@id": "_:N60882207c25442eab9509dc96896d91a", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -18840,49 +20732,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Aggregation Bias" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -18897,47 +20782,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#FinancialLoss" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@id": "https://w3id.org/dpv/risk#5RiskLevels", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18951,77 +20832,92 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskLevel" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk#IncidentStatus", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Status" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -19030,33 +20926,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv#Status" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -19065,8 +20961,13 @@ ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19082,33 +20983,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -19121,9 +21025,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6177ab61947545c3b0f993f924c70c28" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19139,70 +21049,82 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", + "@id": "_:N6177ab61947545c3b0f993f924c70c28", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Intentional Misuse" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "Risk Concepts - RDF/XML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Intentional Misuse" + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -19221,7 +21143,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19237,13 +21159,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19254,16 +21176,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -19276,9 +21202,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4cecb70bedcf46ce9f21038688293a9e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19294,49 +21226,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#Bias", + "@id": "_:N4cecb70bedcf46ce9f21038688293a9e", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Daniel Doherty" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RacialDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19352,47 +21292,62 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskConcept" + "@id": "https://w3id.org/dpv/risk#Racism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + "@value": "Discrimination against individuals because of their racial background or skin color" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Bias" + "@value": "Racial Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "_:N91553afacd2e4fc881b533ca4457b82b" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19403,43 +21358,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveImpact", + "@id": "_:N91553afacd2e4fc881b533ca4457b82b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19455,29 +21435,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Confounding Variables Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -19496,7 +21476,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19518,7 +21498,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19529,31 +21509,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighSeverity", + "@id": "https://w3id.org/dpv/risk#RiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19561,6 +21536,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -19569,45 +21549,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Source" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#hasControl", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "High Severity" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/vocab/vann/example": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@id": "https://w3id.org/dpv/examples#E0071" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UserRisks", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -19620,62 +21603,60 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@id": "https://w3id.org/dpv/risk#risk-levels-classes", "@type": [ "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#SamplingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N96a4e2b7a71b485fae480316787e987b" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19691,58 +21672,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Sampling Bias" } ] }, { - "@id": "_:N96a4e2b7a71b485fae480316787e987b", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.40,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -19757,49 +21729,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RequirementsBias", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19815,60 +21786,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs in or during requirements creation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Requirements Bias" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#ReverseDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6e579543453b456ab0c95e8740b1351e" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19879,69 +21831,62 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + "@value": "Reverse Discrimination" } ] }, { - "@id": "_:N6e579543453b456ab0c95e8740b1351e", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#causedByThreat", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19955,35 +21900,51 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" + "@value": "Lose of Credibility" } + ] + }, + { + "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk#ShareRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -19993,12 +21954,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20014,74 +21970,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.n3" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskAssessment", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20089,11 +22023,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#RiskManagement" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -20102,33 +22031,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "A limitation or restrictions on the scope or exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -20141,9 +22079,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.11,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6ec056b8005a44a48b4e0542b09105e6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20159,48 +22103,60 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", + "@id": "_:N6ec056b8005a44a48b4e0542b09105e6", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20216,39 +22172,80 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Threat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskSource" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -20257,33 +22254,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20304,7 +22306,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na49aef6e701446fe912e1e7c19c0f7f0" + "@id": "_:N6eb433c5024843b085be0656a9fc2cbb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20320,32 +22322,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Spoofing" } ] }, { - "@id": "_:Na49aef6e701446fe912e1e7c19c0f7f0", + "@id": "_:N6eb433c5024843b085be0656a9fc2cbb", "@type": [ "https://schema.org/WebPage" ], @@ -20361,27 +22360,30 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20397,54 +22399,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#bias-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Simpson'S Paradox Bias" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#DataBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N37489c12dfc848018493bc0b4ca8a3a2" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20460,52 +22466,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Bias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:N37489c12dfc848018493bc0b4ca8a3a2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "Data Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk#7SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -20515,18 +22502,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nef4bef8d59b941d3948be26790d5a59f" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20542,43 +22518,62 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "7 Severity Levels" } ] }, { - "@id": "_:Nef4bef8d59b941d3948be26790d5a59f", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" } ] } diff --git a/2.1-dev/risk/risk.n3 b/2.1-dev/risk/risk.n3 index f2f9ba46b..21d4791d7 100644 --- a/2.1-dev/risk/risk.n3 +++ b/2.1-dev/risk/risk.n3 @@ -137,17 +137,38 @@ risk:AccidentalIncident a rdfs:Class, risk:AccidentalMisuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:UserRisks ; + skos:broader risk:Misuse ; skos:definition "Accidental Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Accidental Misuse"@en . +risk:AgeDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's age, often impacting older or younger individuals"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Age Discrimination"@en . + risk:AuthorisationFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -156,21 +177,35 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Authorisation Failure"@en . risk:AvailabilityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:DataBreach ; - skos:inScheme risk:risk-consequences-classes . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-taxonomy-classes . + +risk:AvailabilityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Availability' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Availability Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . risk:AvailabilityIncident a rdfs:Class, skos:Concept ; @@ -197,33 +232,43 @@ risk:AvoidSource a rdfs:Class, risk:Benefit a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Compensation ; skos:definition "Something that acts as or causes benefits"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Benefit"@en . risk:Bias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RiskConcept ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Bias"@en . risk:Blackmail a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -232,15 +277,18 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Blackmail"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Blackmail"@en . risk:BruteForceAuthorisations a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -249,13 +297,25 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Brute Force Authorisations"@en . +risk:CasteDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's caste, a form of social stratification found in some cultures"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Caste Discrimination"@en . + risk:ChangeConsequence a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -282,7 +342,11 @@ risk:ChangeImpact a rdfs:Class, risk:Coercion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -291,65 +355,82 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Coercion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coercion"@en . risk:CognitiveBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Bias ; skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cognitive Bias"@en . risk:Compensation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compensation"@en . risk:ComponentFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . risk:ComponentMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . risk:CompromiseAccount a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -358,17 +439,18 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account"@en . risk:CompromiseAccountCredentials a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -377,15 +459,18 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account Credentials"@en . risk:ConfidentialityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -394,12 +479,24 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:DataBreach ; + skos:broader risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confidentiality Breach"@en . +risk:ConfidentialityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Confidentiality Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk:ConfidentialityIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -413,28 +510,34 @@ risk:ConfidentialityIncident a rdfs:Class, risk:ConfirmationBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confirmation Bias"@en . risk:ConfoundingVariablesBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:StatisticalBias ; skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confounding Variables Bias"@en . risk:ConsequenceControl a rdfs:Class, @@ -462,7 +565,9 @@ risk:ContainmentControl a rdfs:Class, risk:CopyrightViolation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -471,22 +576,25 @@ risk:CopyrightViolation a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Copyright Violation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Copyright Violation"@en . risk:CoverageBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SelectionBias ; skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coverage Bias"@en . risk:CrossBorderIncident a rdfs:Class, @@ -502,7 +610,10 @@ risk:CrossBorderIncident a rdfs:Class, risk:Cryptojacking a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -511,15 +622,17 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Cryptojacking"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cryptojacking"@en . risk:Damage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -527,38 +640,50 @@ risk:Damage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Damage"@en . risk:DataAggregationBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBias ; skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Aggregation Bias"@en . risk:DataBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Bias ; skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Bias"@en . risk:DataBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -569,17 +694,18 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:SecurityBreach ; + skos:broader risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Breach"@en . risk:DataCorruption a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -588,24 +714,26 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk:DataProcessingBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBias ; skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Processing Bias"@en . risk:DeliberateIncident a rdfs:Class, @@ -621,7 +749,10 @@ risk:DeliberateIncident a rdfs:Class, risk:DenialServiceAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -630,10 +761,9 @@ risk:DenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk:DetectionControl a rdfs:Class, @@ -649,7 +779,9 @@ risk:DetectionControl a rdfs:Class, risk:Detriment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -657,25 +789,63 @@ risk:Detriment a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Detriment"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Detriment"@en . +risk:DirectDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Direct Discrimination"@en . + +risk:DisabilityDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination against individuals based on physical or mental disabilities"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Disability Discrimination"@en . + risk:Discrimination a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dct:created "2022-08-19"^^xsd:date, + "2024-09-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Discrimination"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RiskConcept, + risk:SocietalRisk ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, + "Something that acts as or causes Discrimination"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Discrimination"@en . risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -684,10 +854,9 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:DenialServiceAttack ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . risk:EnvironmentalIncident a rdfs:Class, @@ -703,17 +872,24 @@ risk:EnvironmentalIncident a rdfs:Class, risk:EnvironmentalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Environmental Risk"@en . risk:EquipmentFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -722,16 +898,19 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . risk:EquipmentMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -740,16 +919,18 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . risk:ErroneousSystemUse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -760,12 +941,43 @@ risk:ErroneousSystemUse a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Erroneous System Use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Erroneous System Use"@en . +risk:EthnicDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Racism ; + skos:definition "Discrimination against individuals based on their ethnicity or cultural heritage"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Ethnic Discrimination"@en . + +risk:ExcellenceDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Favoritism towards individuals deemed more competent or superior, often at the expense of others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Excellence Discrimination"@en . + risk:ExposureToHarmfulSpeech a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -776,23 +988,28 @@ risk:ExposureToHarmfulSpeech a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Harmful Speech"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . risk:ExternalSecurityThreat a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "External Security Threat"@en . risk:Extorsion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -801,10 +1018,9 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Extorsion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Extorsion"@en . risk:ExtremelyHighLikelihood a rdfs:Class, @@ -891,33 +1107,25 @@ risk:ExtremelyLowSeverity a rdfs:Class, skos:prefLabel "Extremely Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1"@en . -risk:Fee a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source "DGA 2.10"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "modified"@en ; - skos:broader risk:FinancialImpact ; - skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Fee"@en . - risk:FinancialImpact a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Impact"@en . risk:FinancialLoss a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -928,12 +1136,16 @@ risk:FinancialLoss a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Loss"@en . risk:Fraud a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -942,23 +1154,53 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Fraud"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Fraud"@en . +risk:GenderDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Discrimination based on a person's gender identity or gender expression"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Gender Discrimination"@en . + +risk:GeographicDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's geographical origin or residence"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Geographic Discrimination"@en . + risk:GroupAttributionBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Group Attribution Bias"@en . risk:HaltSource a rdfs:Class, @@ -973,9 +1215,24 @@ risk:HaltSource a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Halt Source"@en . +risk:Harassment a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Harassment"@en . + risk:Harm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -983,7 +1240,7 @@ risk:Harm a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; skos:definition "Something that acts as or causes Harm to humans"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -1035,9 +1292,26 @@ risk:HighSeverity a rdfs:Class, skos:prefLabel "High Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1"@en . +risk:Homophobia a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SexualOrientationDiscrimination ; + skos:definition "Hostility or prejudice against individuals who are or are perceived to be homosexual"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Homophobia"@en . + risk:HumanErrors a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1048,7 +1322,7 @@ risk:HumanErrors a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Human Errors"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Human Errors"@en . risk:IdentificationControl a rdfs:Class, @@ -1064,7 +1338,11 @@ risk:IdentificationControl a rdfs:Class, risk:IdentityFraud a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1073,15 +1351,18 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Identity Fraud"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Fraud"@en . risk:IdentityTheft a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1090,15 +1371,16 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Identity Theft"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Theft"@en . risk:IllegalDataProcessing a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1109,7 +1391,7 @@ risk:IllegalDataProcessing a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -1127,28 +1409,34 @@ risk:ImpactControl a rdfs:Class, risk:ImplicitBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Implicit Bias"@en . risk:InGroupBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "In-Group Bias"@en . risk:Incident a rdfs:Class, @@ -1423,39 +1711,65 @@ risk:IncidentTerminated a rdfs:Class, skos:inScheme risk:incident-status-classes ; skos:prefLabel "Incident Terminated"@en . +risk:IndirectDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Indirect Discrimination"@en . + risk:IndividualHealthSafety a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Health & Safety"@en . risk:IndividualRisk a rdfs:Class, - skos:Concept ; + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Risk"@en . risk:InformativenessBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:EngineeringDecisionBias ; skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Informativeness Bias"@en . risk:Injury a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1464,19 +1778,35 @@ risk:Injury a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Injury"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Injury"@en . risk:IntegrityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach, - risk:IntegrityConcept ; - skos:inScheme risk:risk-consequences-classes . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-taxonomy-classes . + +risk:IntegrityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Integrity Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . risk:IntegrityIncident a rdfs:Class, skos:Concept ; @@ -1491,17 +1821,24 @@ risk:IntegrityIncident a rdfs:Class, risk:IntentionalMisuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:UserRisks ; + skos:broader risk:Misuse ; skos:definition "Intentional Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intentional Misuse"@en . risk:InterceptCommunications a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1510,46 +1847,70 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Interception of Communications"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . risk:JudicialCosts a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:FinancialLoss ; skos:definition "Something that involves or causes judicial costs to be paid"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Judicial Costs"@en . risk:JudicialPenalty a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:FinancialLoss ; skos:definition "Something that involves or causes judicial penalties to be paid"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Judicial Penalty"@en . +risk:LanguageDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Language Discrimination"@en . + risk:LegalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Legal Risk"@en . risk:LoseCredibility a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1560,12 +1921,15 @@ risk:LoseCredibility a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Credibility"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Credibility"@en . risk:LoseCustomerConfidence a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1576,12 +1940,15 @@ risk:LoseCustomerConfidence a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Customer Confidence"@en . risk:LoseGoodwill a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1592,12 +1959,15 @@ risk:LoseGoodwill a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Goodwill"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Goodwill"@en . risk:LoseNegotiatingCapacity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1608,12 +1978,15 @@ risk:LoseNegotiatingCapacity a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Negotiating Capacity"@en . risk:LoseOpportunity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1624,12 +1997,15 @@ risk:LoseOpportunity a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Opportunity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Opportunity"@en . risk:LoseReputation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1640,12 +2016,15 @@ risk:LoseReputation a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Reputation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Reputation"@en . risk:LoseTrust a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1656,7 +2035,7 @@ risk:LoseTrust a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Trust"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Trust"@en . risk:LowLikelihood a rdfs:Class, @@ -1707,9 +2086,27 @@ risk:LowSeverity a rdfs:Class, skos:prefLabel "Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1"@en . +risk:MaliciousActivity a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Malicious Activity"@en . + risk:MaliciousCodeAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1718,17 +2115,19 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malicious Code Attack"@en . risk:MalwareAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1737,17 +2136,17 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Malware Attack"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malware Attack"@en . risk:MaterialDamage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1755,13 +2154,44 @@ risk:MaterialDamage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Material Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk:Misandry a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Dislike, contempt, or prejudice against men"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Misandry"@en . + +risk:Misogyny a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Dislike, contempt, or prejudice against women"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Misogyny"@en . + risk:Misuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1769,7 +2199,7 @@ risk:Misuse a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Misuse"@en . risk:ModerateLikelihood a rdfs:Class, @@ -1905,9 +2335,26 @@ risk:MonitorVulnerabilities a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Monitor Vulnerabilities"@en . +risk:NationalityDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's nationality or citizenship"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Nationality Discrimination"@en . + risk:NonMaterialDamage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1915,75 +2362,92 @@ risk:NonMaterialDamage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Non-Material Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk:NonNormalityBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:StatisticalBias ; skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Normality Bias"@en . risk:NonResponseBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SelectionBias ; skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Response Bias"@en . risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that arise during operational processes"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Operational Security Risk"@en . risk:OutGroupHomogeneityBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Out-Group Homogeneity Bias"@en . risk:Payment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Payment"@en . risk:PersonalSafetyEndangerment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1994,12 +2458,16 @@ risk:PersonalSafetyEndangerment a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Personal Safety Endangerment"@en . risk:PhishingScam a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2008,15 +2476,17 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Phishing Scam"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Phishing Scam"@en . risk:PhysicalAssault a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2025,32 +2495,93 @@ risk:PhysicalAssault a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Physical Assault"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Assault"@en . risk:PhysicalHarm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Harm"@en . +risk:PotentialConsequence a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'consequence concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Consequence"@en ; + skos:scopeNote "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialImpact a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'impact' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Impact"@en ; + skos:scopeNote "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialRisk a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'risk' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Risk"@en ; + skos:scopeNote "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialRiskSource a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'risk source' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential RiskSource"@en ; + skos:scopeNote "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + risk:Privacy a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Privacy"@en . risk:PsychologicalHarm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2059,14 +2590,16 @@ risk:PsychologicalHarm a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Psychological Harm"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Psychological Harm"@en . risk:PublicOrderBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2077,7 +2610,7 @@ risk:PublicOrderBreach a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Public Order Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Public Order Breach"@en . risk:RM3x3S1L1 a rdfs:Class, @@ -3159,6 +3692,34 @@ risk:RM7x7S7L7 a rdfs:Class, skos:inScheme risk:risk-matrix-classes ; skos:prefLabel "Extremely High Risk (RM7x7 S:7 L:7)"@en . +risk:RacialDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Racism ; + skos:definition "Discrimination against individuals because of their racial background or skin color"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Racial Discrimination"@en . + +risk:Racism a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Prejudice or discrimination against people based on their race"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Racism"@en . + risk:RecoveryControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -3207,19 +3768,36 @@ risk:ReductionControl a rdfs:Class, risk:Reidentification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . +risk:ReligiousDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's religious beliefs or practices"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Religious Discrimination"@en . + risk:RemedyControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -3269,7 +3847,10 @@ risk:RemoveSource a rdfs:Class, risk:Renumeration a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3277,63 +3858,134 @@ risk:Renumeration a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Remuneration"@en . risk:ReputationalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reputational Risk"@en . risk:RequirementsBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs in or during requirements creation"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Requirements Bias"@en ; skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . +risk:ReverseDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Reverse Discrimination"@en . + risk:Reward a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reward"@en . +risk:RightEroded a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Erosion of Rights"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightObstructed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Obstruction of Rights"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightsDenial a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Denial of Rights"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk:RightsExercisePrevention a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Prevent Exercising of Rights"@en ; - skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsImpact a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3342,40 +3994,59 @@ risk:RightsImpact a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Impact, - risk:SocietalRisk ; + skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Impact to Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Impact to Rights"@en ; - skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsLimitation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Limitation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Limitation of Rights"@en ; - skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightsUnfulfilled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Failure to meet or complete the fulfilment of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Unfulfilment of Rights"@en ; + skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsViolation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Violation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Rights"@en ; - skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RiskAnalysis a rdfs:Class, skos:Concept ; @@ -3492,21 +4163,29 @@ risk:RiskSource a rdfs:Class, risk:RuleBasedSystemDesign a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Rule-Based System Design"@en ; skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . risk:Sabotage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3515,29 +4194,34 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Sabotage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sabotage"@en . risk:SamplingBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SelectionBias ; skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sampling Bias"@en . risk:Scam a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3546,28 +4230,35 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Scam"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Scam"@en . risk:SecurityAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Attack"@en . risk:SecurityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3576,30 +4267,87 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Breach"@en . risk:SelectionBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:StatisticalBias ; skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Selection Bias"@en . +risk:SexDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Discrimination based on a person's biological sex"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sex Discrimination"@en . + +risk:Sexism a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sexism"@en . + +risk:SexualHarassment a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sexual Harassment"@en . + +risk:SexualOrientationDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "SexualOrientation Discrimination"@en . + risk:SexualViolence a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3608,9 +4356,9 @@ risk:SexualViolence a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Sexual Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sexual Violence"@en . risk:ShareRisk a rdfs:Class, @@ -3627,20 +4375,26 @@ risk:ShareRisk a rdfs:Class, risk:SimpsonsParadoxBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBias ; skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Simpson'S Paradox Bias"@en . risk:SocialDisadvantage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3648,39 +4402,48 @@ risk:SocialDisadvantage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Social Disadvantage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Social Disadvantage"@en . risk:SocietalBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Bias"@en . risk:SocietalHealthSafety a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Health & Safety"@en . risk:SocietalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Risk"@en . risk:SourceControl a rdfs:Class, @@ -3697,42 +4460,48 @@ risk:SourceControl a rdfs:Class, risk:Spoofing a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Spoofing"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Spoofing"@en . risk:StatisticalBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO 20501:2019"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBias ; skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Statistical Bias"@en . risk:SystemFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3741,16 +4510,20 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:SystemIntrusion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3759,17 +4532,18 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes System Intrusion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Intrusion"@en . risk:SystemMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3778,16 +4552,18 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:Terrorism a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3798,7 +4574,7 @@ risk:Terrorism a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Terrorism"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Terrorism"@en . risk:Threat a rdfs:Class, @@ -3822,9 +4598,29 @@ risk:ThreatSource a rdfs:Class, skos:inScheme risk:core-classes ; skos:prefLabel "Threat Source"@en . +risk:Transphobia a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Transphobia"@en . + risk:UnauthorisedAccesstoPremises a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3833,30 +4629,35 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . risk:UnauthorisedActivity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Activity"@en . risk:UnauthorisedCodeAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3865,16 +4666,18 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Access"@en . risk:UnauthorisedCodeDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3883,15 +4686,18 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk:UnauthorisedCodeModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3900,15 +4706,18 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Modification"@en . risk:UnauthorisedDataAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3917,15 +4726,18 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Access"@en . risk:UnauthorisedDataDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3934,15 +4746,18 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk:UnauthorisedDataModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3951,15 +4766,18 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Modification"@en . risk:UnauthorisedInformationDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3968,29 +4786,35 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk:UnauthorisedReidentification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . risk:UnauthorisedResourceUse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3999,15 +4823,19 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Resource Use"@en . risk:UnauthorisedSystemAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4016,16 +4844,18 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Access"@en . risk:UnauthorisedSystemModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4034,15 +4864,19 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Modification"@en . risk:UnwantedCodeDeletion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4051,16 +4885,19 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Code Deletion"@en . risk:UnwantedDataDeletion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4069,16 +4906,18 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Data Deletion"@en . risk:UnwantedDisclosureData a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4087,20 +4926,21 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk:UserRisks a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "User Risks"@en . risk:VeryHighLikelihood a rdfs:Class, @@ -4195,7 +5035,9 @@ risk:VeryLowSeverity a rdfs:Class, risk:ViolatingCodeOfConduct a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4204,15 +5046,17 @@ risk:ViolatingCodeOfConduct a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . risk:ViolatingContractualObligation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4221,15 +5065,17 @@ risk:ViolatingContractualObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk:ViolatingEthicsCode a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4238,15 +5084,17 @@ risk:ViolatingEthicsCode a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . risk:ViolatingLegalObligation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4255,25 +5103,29 @@ risk:ViolatingLegalObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Legal Obligations"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . risk:ViolatingPolicy a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Policy"@en . risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4282,15 +5134,18 @@ risk:ViolatingStatutoryObligations a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk:ViolenceAgainstChildren a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4299,9 +5154,9 @@ risk:ViolenceAgainstChildren a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Child Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . @@ -4556,15 +5411,13 @@ risk:serialisation-ttl a profile:ResourceDescriptor ; profile:hasArtifact ; profile:hasRole role:guidance . -risk:core-classes a skos:ConceptScheme . - risk:incident-status-classes a skos:ConceptScheme . risk:core-properties a skos:ConceptScheme . -risk:incident-classes a skos:ConceptScheme . +risk:core-classes a skos:ConceptScheme . -risk:bias-classes a skos:ConceptScheme . +risk:incident-classes a skos:ConceptScheme . risk:risk-controls-classes a skos:ConceptScheme . @@ -4572,5 +5425,5 @@ risk:risk-levels-classes a skos:ConceptScheme . risk:risk-matrix-classes a skos:ConceptScheme . -risk:risk-consequences-classes a skos:ConceptScheme . +risk:risk-taxonomy-classes a skos:ConceptScheme . diff --git a/2.1-dev/risk/risk.rdf b/2.1-dev/risk/risk.rdf index 9dadc7d76..4d8070481 100644 --- a/2.1-dev/risk/risk.rdf +++ b/2.1-dev/risk/risk.rdf @@ -13,711 +13,585 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - - Moderate Risk (RM7x7 S:6 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - - 0.24,xsd:decimal + + + + + Cryptojacking + Something that acts as or causes Cryptojacking + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Sabotage - Something that acts as or causes Sabotage - - - - - 2022-08-17 - 2024-08-16 + + Monitor Impact + Control that monitors a Risk Impact + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Non-Normality Bias - Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - - ISO/IEC 24027:2021 - 2024-09-13 + + + + + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + accepted - Daniel Doherty - + - + - - Extremely High Severity - Level where Severity is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + Risk Source + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + + + 2024-02-14 + 2024-08-16 accepted - Harshvardhan J. Pandit - + - + - Deliberate Incident - Incident caused due to deliberate actions of a human - - - 2024-05-19 + + + + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + accepted - + - + - Unauthorised System Access - Something that acts as or causes Unauthorised System Access - - - - + + + + + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Incident Detection Report - A report describing the detection of a Incident - - - 2024-05-19 + + + + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - - Low Risk (RM7x7 S:3 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.18,xsd:decimal - 2022-08-17 + + Monitor Control + Risk Mitigation Measure that uses controls to monitor events + + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + 2024-05-19 accepted Harshvardhan J. Pandit - + - + + + + + + + + + Component Failure + Something that acts as or causes Component Failure + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + accepted + + + + - High Risk (RM7x7 S:3 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + Moderate Risk (RM7x7 S:2 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - 0.31,xsd:decimal + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification - - - + + High Risk (RM7x7 S:7 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High + + 0.43,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Statistical Bias - Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - - ISO 20501:2019 - 2024-09-13 + + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising + + 2024-05-19 accepted - Daniel Doherty + Harshvardhan J. Pandit - + - + + + + + + + Risk Concepts - N3 serialiation + + - High Risk (RM5x5 S:4 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + Moderate Risk (RM5x5 S:2 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - 0.48,xsd:decimal + 0.32,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Lose of Opportunity - Something that acts as or causes Loss of Opportunity - - - 2022-08-17 - 2024-08-16 + + + + Financial Impact + Things that cause or have the potential to impact financial resources + accepted - Harshvardhan J. Pandit - + - + - - Extremely High Likelihood - Level where Likelihood is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + + + + Intentional Misuse + Intentional Misuse + + accepted + + + + + + + + + + + + Re-identification + Something that acts as or causes Re-identification + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM7x7 S:6 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - 0.61,xsd:decimal + 0.37,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Sexual Violence - Something that acts as or causes Sexual Violence - - + + High Risk (RM3x3 S:3 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.67,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - - + - has threat source - Indicates the threat (subject) has the indicated source (object) - - - - - 2024-02-14 + + + + + + Unfulfilment of Rights + Failure to meet or complete the fulfilment of rights + + Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - + - + - - Very Low Severity - Level where Severity is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + Integrity Concept + Indicates a concept is relevant to 'Integrity' in CIA InfoSec model + + + This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 accepted Harshvardhan J. Pandit - + - + - - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit - - - - - - - - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - - 0.14,xsd:decimal - 2022-08-17 + + Very High Severity + Level where Severity is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Identity Theft - Something that acts as or causes Identity Theft - - - + + + + + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - Availability Incident - Incident where the availability of information or system has been affected - - - 2024-05-19 - accepted - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - - Accidental Misuse - Accidental Misuse - + + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Informativeness Bias - Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - - ISO/IEC 24027:2021 - 2024-09-13 + + Very Low Risk (RM7x7 S:2 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 accepted - Daniel Doherty + Harshvardhan J. Pandit - + - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Psychological Harm - Something that acts as or causes Psychological Harm + + + + Harm + Something that acts as or causes Harm to humans - - 2022-08-17 + This concept refers to the general abstract notion of harm + 2022-08-13 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Very High Severity - Level where Severity is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + + Moderate Risk (RM7x7 S:4 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM5x5 S:5 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + Low Risk (RM5x5 S:1 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - 0.80,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely Low Risk (RM7x7 S:3 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.06,xsd:decimal + High Risk (RM3x3 S:3 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - + + + + + + + Security Breach + Something that acts as or causes Security Breach - + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Data Bias - Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - - ISO/IEC 24027:2021 - 2024-09-13 + + Low Severity + Level where Severity is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted - Daniel Doherty + Harshvardhan J. Pandit - + - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - + + + + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + 2022-08-17 2024-08-16 - modified - Harshvardhan J. Pandit - - - - - - - - Societal Health & Safety - accepted + Harshvardhan J. Pandit - + - + - Prevent Exercising of Rights - Something that acts as or causes Prevent Exercising of Rights - - This concept was called "PreventExercisingOfRights" in DPV 2.0 + + + + Limitation of Rights + A limitation or restrictions on the scope or exercise of rights + + This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right 2022-08-18 2024-08-16 accepted Georg P. Krog, Harshvardhan J. Pandit - + + + + Physical Assault Something that acts as or causes Physical Assault - - + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Data Corruption - Something that acts as or causes Corruption of Data - - - This concept was called "Corruption Data" in DPV 2.0 - + + + + + + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + 2022-08-17 2024-08-16 - modified - Harshvardhan J. Pandit - - - - - - - - Very Low Risk (RM5x5 S:2 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.08,xsd:decimal - 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Very Low Risk (RM7x7 S:1 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.08,xsd:decimal - 2022-08-17 + + Low Likelihood + Level where Likelihood is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Intercept Communications - Something that acts as or causes Interception of Communications - - - This concept was called "InterceptionCommunications" in DPV 2.0 - + + + + + Identity Fraud + Something that acts as or causes Identity Fraud + + 2022-08-17 2024-08-16 - modified - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - 3 Severity Levels - Scale with 3 Severity Levels from High to Low - - 2022-08-18 accepted Harshvardhan J. Pandit - - - - - - - Moderate Risk (RM5x5 S:4 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.32,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Extremely High Risk (RM7x7 S:5 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.71,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Extremely Low Risk (RM7x7 S:1 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - - 0.06,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Monitor Control - Control that monitors another Control - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) - - - - - 2024-02-14 - accepted - - - - - - - - Very Low Risk (RM7x7 S:5 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - - 0.10,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Lose of Trust - Something that acts as or causes Loss of Trust - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - Risk Control - Control that modifies risk - - - 2024-05-19 - accepted - - - - - - - - - Requirements Bias - Bias that occurs in or during requirements creation - - Requirements bias also represents occasions for the human cognitive biases to manifest - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - + @@ -747,16 +621,16 @@ Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - Harshvardhan J. Pandit Delaram Golpayegani - Julian Flake - Georg P. Krog + Harshvardhan J. Pandit Beatriz Esteves - Daniel Doherty - Fajar Ekaputra + Georg P. Krog + Julio Fernandez Axel Polleres Rob Brennan - Julio Fernandez + Fajar Ekaputra + Julian Flake + Daniel Doherty risk https://w3id.org/dpv/risk# @@ -772,191 +646,247 @@ - + - - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal - 2022-08-17 + + + + + Misuse + Something that acts as or causes Misuse + + 2024-06-11 + 2024-08-16 accepted - Harshvardhan J. Pandit + Delaram Golpayegani - + - + - Authorisation Failure - Something that acts as or causes Authorisation Failure - - - - + + + + + Unwanted Disclosure of Data + Something that acts as or causes Unwanted Disclosure of Data + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Scam - Something that acts as or causes Scam - - - + + Moderate Risk (RM5x5 S:3 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.36,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) + + + 2024-02-14 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Incident Impact Assessment - An impact assessment associated with a incident - - - 2024-05-19 + + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.37,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Incident Report - Documented information about an incident, its handling, assessments,and notifications - - + + Monitor Risk Source + Control that monitors a Risk Source + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - - - - + Incident Mitigation Measure + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + + + 2024-05-19 accepted - + - + - Lose of Goodwill - Something that acts as or causes Loss of Goodwill - - + + + + Terrorism + Something that acts as or causes Terrorism + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - - This concept was called "IllegalProcessingData" in DPV 2.0 - - 2022-08-17 - 2024-08-16 + + Consequence Control + Risk Mitigation Measure that controls the Consequences + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - Very Low Risk (RM7x7 S:6 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + High Risk (RM7x7 S:4 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - 0.12,xsd:decimal + 0.41,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Non-Response Bias - Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - - ISO/IEC 24027:2021 - 2024-09-13 + + + + + Prevent Exercising of Rights + Actions or measures that prevent an individual or group from exercising their legal rights. + + This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 + 2024-08-16 accepted - Daniel Doherty + Georg P. Krog, Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.12,xsd:decimal + 0.10,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Reduce Likelihood - Control that reduces the likelihood of an event - - 2024-05-19 + + + + + Geographic Discrimination + Discrimination based on a person's geographical origin or residence + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 + + + + + Intercept Communications + Something that acts as or causes Interception of Communications + + This concept was called "InterceptionCommunications" in DPV 2.0 + + 2022-08-17 2024-08-16 + modified + Harshvardhan J. Pandit + + + + + + + + Moderate Risk (RM7x7 S:7 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + + 0.29,xsd:decimal + 2022-08-17 accepted - Georg P. Krog + Harshvardhan J. Pandit - + @@ -973,1092 +903,1219 @@ - - - - - Examples for Data Privacy Vocabulary - - - - + - - Very High Risk (RM7x7 S:5 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.51,xsd:decimal - 2022-08-17 + + 5 Severity Levels + Scale with 5 Severity Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Financial Impact - Things that cause or have the potential to impact financial resources - + + + + + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - - High Risk - Level where Risk is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + + + + + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Moderate Risk (RM7x7 S:5 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.31,xsd:decimal - 2022-08-17 + + + + + Religious Discrimination + Discrimination based on a person's religious beliefs or practices + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - - Individual Health & Safety - + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions + + + 2024-05-19 accepted - + - + - - - + + Incident Halted + The incident has halted or paused with a high likelihood of resuming or recurring + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - Threat - Risk source event which causes Risk - - - 2024-02-14 + + Moderate Severity + Level where Severity is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - - 0.43,xsd:decimal - 2022-08-17 + + + + + Confounding Variables Bias + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability - - 2024-05-19 + + Low Risk (RM7x7 S:5 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Copyright Violation - Something that acts as or causes Copyright Violation - - + + + + + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Monitor Control - Risk Mitigation Measure that uses controls to monitor events - - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - 2024-05-19 + Potential RiskSource + Indicates a concept can potentially be a 'risk source' concept within an use-case + + + PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted Harshvardhan J. Pandit - + - + - - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - - - 2022-08-17 - 2024-08-16 + + Incident Mitigated + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + + - - - Judicial Penalty - Something that involves or causes judicial penalties to be paid - + exploits vulnerability + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + + 2024-02-14 accepted - + - + - Reputational Risk - Risks and issues that affect the reputation of the organisation - + + + + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - + - + - Risk Source - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - - - 2024-02-14 - 2024-08-16 + + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.02,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - - - - - In-Group Bias - Bias that occurs when showing partiality to one's own group or own characteristics - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - + + + + + + + Risk Concepts - Turtle serialiation - + + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + - Moderate Risk (RM3x3 S:1 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.33,xsd:decimal + High Risk (RM5x5 S:5 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + + 0.60,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form - - 2024-04-14 - 2024-08-16 + + Moderate Risk (RM7x7 S:2 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - + - Malicious Code Attack - Something that acts as or causes Malicious Code Attack - - - - - + + + + Lose of Goodwill + Something that acts as or causes Loss of Goodwill + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - - - - - 2022-08-17 - 2024-08-16 + + + + + Caste Discrimination + Discrimination based on a person's caste, a form of social stratification found in some cultures + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - - + - is exploited by - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - - 2024-02-14 + + + + + + Statistical Bias + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + + ISO 20501:2019 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Environmental Incident - Incident caused due to environmental factors outside human controls - - - 2024-05-19 + + + + + + + Sabotage + Something that acts as or causes Sabotage + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - - Very Low Risk (RM5x5 S:3 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal + + + + + + Extorsion + Something that acts as or causes Extorsion + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Bias - Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - - ISO/IEC 24027:2021 - 2024-09-13 + + + + + + + + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty + Harshvardhan J. Pandit - + - + - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High + Very Low Risk (RM7x7 S:6 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.73,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Simpson'S Paradox Bias - Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - - ISO/IEC 24027:2021 - 2024-09-13 + + Monitor Risk + Control that monitors a Risk + + 2024-05-19 accepted - Daniel Doherty + Harshvardhan J. Pandit - + - + - - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - - - 2022-08-17 - 2024-08-16 + + Containment Control + Control to contain event + + 2024-05-19 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + Availability Incident + Incident where the availability of information or system has been affected + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Fee - Something that acts as or provides fees e.g. for using a service - - DGA 2.10 + + + + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + 2024-04-14 2024-08-16 - modified + accepted Georg P. Krog, Harshvardhan J. Pandit - + - + - - Identity Fraud - Something that acts as or causes Identity Fraud - - - - 2022-08-17 - 2024-08-16 + + Incident Status Unknown + The status of a incident is unknown + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - - + + Low Risk (RM7x7 S:3 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.18,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM3x3 S:2 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.44,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + 0.86,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - - - Here equipment refers to physical equipment - + + Moderate Risk (RM7x7 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.31,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Re-identification - Something that acts as or causes Re-identification - - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 - 2024-08-16 + + Low Risk (RM3x3 S:1 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + + 0.22,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Very High Risk (RM5x5 S:4 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.64,xsd:decimal - 2022-08-17 + Confidentiality Concept + Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + + + This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 accepted Harshvardhan J. Pandit - + - + - - Damage - Something that acts as or causes Damage - - 2022-03-30 - 2024-08-16 + + + + + Misandry + Dislike, contempt, or prejudice against men + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - + + + + + + + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM3x3 S:3 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - - 0.99,xsd:decimal - 2022-08-17 + + + + + Judicial Costs + Something that involves or causes judicial costs to be paid + accepted - Harshvardhan J. Pandit - + - + + + + + + + + Excellence Discrimination + Favoritism towards individuals deemed more competent or superior, often at the expense of others + + 2024-09-30 + accepted + + + + - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - - - - + + + + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + accepted - + - + - Blackmail - Something that acts as or causes Blackmail - - - + + + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - + + + + has incident + Indicates an incident is associated with the specified context + + + 2024-02-14 + accepted + + + + + + + has control + Indicates the use of specified control + + + 2024-02-14 + accepted + + + + + - - Halt Source - Control that halts the risk source or prevents it from materialising - - 2024-05-19 + + + + + Sexual Harassment + accepted - Harshvardhan J. Pandit - + - + - - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - 0.22,xsd:decimal - 2022-08-17 + + High Risk + Level where Risk is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access - - - - + + + + Impact to Rights + Something that acts as or causes Impact to Rights + + This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - 0.99,xsd:decimal + 0.14,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Confidentiality Incident - Incident where the confidentiality of information or system has been affected - - - 2024-05-19 + + + + + + Fraud + Something that acts as or causes Fraud + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Incident Handling Report - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - - 2024-05-19 - accepted - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - caused by vulnerability - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - 2024-02-14 + Availability Concept + Indicates a concept is relevant to 'Availability' in CIA InfoSec model + + + This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 accepted + Harshvardhan J. Pandit - + - - + - is vulnerability of - Indicates the vulnerability (subject) is associated with indicated context (object) - - - 2024-02-14 + + + Avoid Source + Control that avoids the risk source + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 + + + + + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - - 2024-02-14 + + Low Risk (RM7x7 S:4 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Data Breach - Something that acts as or causes Data Breach - - - - - - 2022-08-17 - 2024-08-16 + Potential Impact + Indicates a concept can potentially be a 'impact' concept within an use-case + + + PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted Harshvardhan J. Pandit - - - + - - + + + + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + + 2024-02-14 + accepted + + + + + - - Violation of Rights - Something that acts as or causes Violation of Rights - - This concept was called "ViolationOfRights" in DPV 2.0 - 2022-08-18 - 2024-08-16 + + Low Risk (RM7x7 S:1 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + + 0.14,xsd:decimal + 2022-08-17 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - + - - Out-Group Homogeneity Bias - Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - - ISO/IEC 24027:2021 - 2024-09-13 + + + External Security Threat + Concepts associated with security threats that are likely to originate externally + accepted - Daniel Doherty - + - + - - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 + + 5 Risk Levels + Scale with 5 Risk Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Lose of Reputation - Something that acts as or causes Loss of Reputation - - + + Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.71,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + + + + + + + Data Breach + Something that acts as or causes Data Breach + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit + + - + - + - Impact to Rights - Something that acts as or causes Impact to Rights - - - This concept was called "ImpactToRights" in DPV 2.0 - + + + + + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Risk Assessment - Assessment of risk involving its identification, analysis, and evaluation - - - ISO 31073:2022 Risk management vocabulary - 2024-02-14 + + + + + Obstruction of Rights + Interference with or blocking of the exercise of rights + + In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - 5 Risk Levels - Scale with 5 Risk Levels from Very High to Very Low - - 2022-08-18 + + + + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + + - - - Low Risk (RM3x3 S:1 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.11,xsd:decimal - 2022-08-17 + refers to risk + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + + 2024-02-14 accepted - Harshvardhan J. Pandit + - + - + - - 3 Risk Levels - Scale with 3 Risk Levels from High to Low - - 2022-08-18 + + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Lose of Customer Confidence - Something that acts as or causes Loss of Customer Confidence - - + + + + + Unauthorised Resource Use + Something that acts as or causes Unauthorised Resource Use + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low - - 2022-08-18 - accepted - Harshvardhan J. Pandit - - + - + - - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low - - 2022-08-18 + + + + + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - + - - Low Likelihood - Level where Likelihood is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + + + + Non-Response Bias + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Incident Identifier - Identifier associated with an incident - + + Monitor Consequence + Control that monitors a Risk Consequence + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:5 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + Low Risk (RM7x7 S:2 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - 0.41,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - Monitor Risk Source - Control that monitors a Risk Source - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - High Risk (RM5x5 S:5 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.60,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - - + + Very Low Risk (RM5x5 S:3 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Misuse - Something that acts as or causes Misuse - - 2024-06-11 - 2024-08-16 + + + + + Data Processing Bias + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Delaram Golpayegani + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - Incident Status Unknown - The status of a incident is unknown - - 2024-02-14 + + Very High Likelihood + Level where Likelihood is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Moderate Risk (RM7x7 S:3 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal - 2022-08-17 + + High Severity + Level where Severity is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Extremely Low Risk (RM7x7 S:1 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.04,xsd:decimal - 2022-08-17 + + Recovery Control + Control to recover from event + + 2024-05-19 + accepted + + + + + + + + Share Risk + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Cryptojacking - Something that acts as or causes Cryptojacking - - - + + High Risk (RM5x5 S:5 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.40,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - + Moderate Risk (RM7x7 S:3 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + 0.24,xsd:decimal 2022-08-17 accepted @@ -2066,331 +2123,379 @@ - + - Very High Likelihood - Level where Likelihood is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 5 Likelihood Levels + Scale with 5 Likelihood Levels from Very High to Very Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society - + + + + Lose of Customer Confidence + Something that acts as or causes Loss of Customer Confidence + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion - - - - + + + + + Confidentiality Breach + Something that acts as or causes Confidentiality Breach + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Spoofing - Something that acts as or causes Spoofing - - - - - - - 2022-08-17 - 2024-08-16 + + Incident Ongoing + The incident is ongoing i.e. still active + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - Very Low Risk (RM5x5 S:1 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Moderate Risk (RM5x5 S:3 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - 0.08,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM5x5 S:2 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.32,xsd:decimal + Risk Matrix 5x5 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + - - Moderate Risk (RM5x5 S:3 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.36,xsd:decimal - 2022-08-17 + + + + + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + + + + + + + + Accidental Misuse + Accidental Misuse + + accepted + + + + - Extremely High Risk (RM7x7 S:6 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.86,xsd:decimal + High Risk (RM5x5 S:4 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + - - - Extremely Low Severity - Level where Severity is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + has threat source + Indicates the threat (subject) has the indicated source (object) + + + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - - Unauthorised Resource Use - Something that acts as or causes Unauthorised Resource Use - - - + + Extremely Low Risk (RM7x7 S:2 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.08,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises - - - - - - 2022-08-17 + + + + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + + + + Threat Source + Source of threat event, including both agent and non-agent sources + + 2024-02-14 + accepted + + + + - Coverage Bias - Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - + + + + Requirements Bias + Bias that occurs in or during requirements creation + + Requirements bias also represents occasions for the human cognitive biases to manifest ISO/IEC 24027:2021 2024-09-13 accepted - Daniel Doherty + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.67,xsd:decimal - 2022-08-17 + Potential Consequence + Indicates a concept can potentially be a 'consequence concept within an use-case + + + PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM3x3 S:3 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.67,xsd:decimal + + + + + + Blackmail + Something that acts as or causes Blackmail + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" - - 2024-02-14 + + + + + + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + + + + + Language Discrimination + Discrimination based on a person's language, often linked to national origin or ethnicity + + 2024-09-30 + accepted + + + + - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - + + + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - + - - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - + + Risk Matrix 3x3 + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Detriment - Something that acts as or causes Detriment - - 2022-03-23 - 2024-08-16 + + + + + Misogyny + Dislike, contempt, or prejudice against women + + 2024-09-30 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + - + - Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Extremely High Risk (RM7x7 S:7 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - 0.86,xsd:decimal + 0.71,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 - 2024-08-16 + + 3 Likelihood Levels + Scale with 3 Likelihood Levels from High to Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Lose of Credibility - Something that acts as or causes Loss of Credibility - - - 2022-08-17 - 2024-08-16 + + + + + Transphobia + Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + + 2024-09-30 accepted - Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Moderate Severity - Level where Severity is Moderate - - - + + Moderate Risk + Level where Risk is Moderate + + + 0.5,xsd:decimal The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 2022-08-18 @@ -2399,139 +2504,244 @@ - - - - - Data Aggregation Bias - Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty - - - - + - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.16,xsd:decimal + High Risk (RM7x7 S:5 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.41,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - - 2022-08-17 - 2024-08-16 + + Very Low Severity + Level where Severity is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Remedy Control - Control to remedy consequences of event - - 2024-05-19 + + Moderate Risk (RM3x3 S:2 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.44,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - Risk Management - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - ISO 31073:2022 Risk management vocabulary - 2024-06-12 + + + + + Bias + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Low Risk (RM7x7 S:2 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.20,xsd:decimal + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + + 0.80,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Containment Control - Control to contain event - + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts + + 2024-05-19 accepted - + - + - - Incident Halted - The incident has halted or paused with a high likelihood of resuming or recurring - - 2024-02-14 + + + + + Sex Discrimination + Discrimination based on a person's biological sex + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - Incident Register - A register recording incidentes, their reports, notifications, and other related activities - - - 2024-05-19 + + + + + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - + + + + Risk Assessment + Assessment of risk involving its identification, analysis, and evaluation + + + ISO 31073:2022 Risk management vocabulary + 2024-02-14 + accepted + + + + - Group Attribution Bias - Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - - ISO/IEC 24027:2021 - 2024-09-13 + + + + Ethnic Discrimination + Discrimination against individuals based on their ethnicity or cultural heritage + + 2024-09-30 accepted - Daniel Doherty - + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.40,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Change Consequence + Control that changes Consequence + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Non-Material Damage + Something that acts as or causes Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + Potential Risk + Indicates a concept can potentially be a 'risk' concept within an use-case + + + PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 + accepted + Harshvardhan J. Pandit + + + + + + + Deliberate Incident + Incident caused due to deliberate actions of a human + + + 2024-05-19 + accepted + + + + + + + + + + + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + @@ -2547,83 +2757,85 @@ - + - Moderate Risk (RM7x7 S:7 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - 0.29,xsd:decimal + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Discrimination - Something that acts as or causes Discrimination - - 2022-08-19 + + + + Lose of Trust + Something that acts as or causes Loss of Trust + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - + - caused by threat - Indicates the cause of associated context (subject) was the indicated threat (object) - - - 2024-02-14 + + + + + + Privacy + accepted - + - + - - Low Risk (RM3x3 S:2 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - - 0.22,xsd:decimal - 2022-08-17 + + Reduce Severity + Control that reduces the severity of an event + + 2024-05-19 accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + + + + accepted + + - + - Extremely High Risk (RM7x7 S:7 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - - 0.71,xsd:decimal + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.11,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit @@ -2637,1309 +2849,1564 @@ A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - + 2022-08-18 accepted Harshvardhan J. Pandit - + - High Risk (RM5x5 S:5 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + Low Risk (RM5x5 S:5 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - 0.40,xsd:decimal + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Very High Risk - Level where Risk is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + + Monitor Vulnerabilities + Control that monitors a Risk Vulnerability + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - Low Risk (RM5x5 S:4 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - 0.16,xsd:decimal + High Risk (RM7x7 S:3 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + + 0.31,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + + Risk Concepts - RDF/XML serialiation + + - Fraud - Something that acts as or causes Fraud - - - + + + + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.02,xsd:decimal - 2022-08-17 + + + + + Benefit + Something that acts as or causes benefits + + 2022-03-23 + 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - System Malfunction - Something that acts as or causes System Malfunction - - - Here system refers to both hardware and software systems - + + + + + + Malware Attack + Something that acts as or causes Malware Attack + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Erroneous System Use - Something that acts as or causes Erroneous System Use - - + + + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - + - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser - - - - - + + + + + Scam + Something that acts as or causes Scam + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising - - 2024-05-19 + + + + + Racism + Prejudice or discrimination against people based on their race + + 2024-09-30 + accepted + + + + + + + + Very High Risk (RM7x7 S:7 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + + 0.57,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Incident Ongoing Report - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - - 2024-05-19 + + + + + + + System Intrusion + Something that acts as or causes System Intrusion + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - - Incident Mitigated - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - - 2024-02-14 + + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.51,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + + + + + System Malfunction + Something that acts as or causes System Malfunction + + Here system refers to both hardware and software systems + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + - Societal Bias - Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + + + Confirmation Bias + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information ISO/IEC 24027:2021 2024-09-13 accepted - Daniel Doherty + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - + - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - - - 2024-02-14 + + + + + + Racial Discrimination + Discrimination against individuals because of their racial background or skin color + + 2024-09-30 accepted - - + - + - - Avoid Source - Control that avoids the risk source - - 2024-05-19 + + + + + Group Attribution Bias + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - Human Errors - Something that acts as or causes Human Errors - - - 2022-08-17 - 2024-08-16 + Environmental Incident + Incident caused due to environmental factors outside human controls + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - - + + Moderate Risk (RM3x3 S:3 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - 7 Severity Levels - Scale with 7 Severity Levels from Extremely High to Extremely Low - - 2022-08-18 + + + + + + Discrimination + Something that acts as or causes Discrimination + Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + + + 2022-08-19 + 2024-09-30 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - + - Reduce Severity - Control that reduces the severity of an event - + Remove Impact + Control that removes Impact i.e. prevents it from materialising + 2024-05-19 accepted Harshvardhan J. Pandit - - - - Incident Preliminary Report - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - - - 2024-05-19 - accepted - - - - + - Equipment Failure - Something that acts as or causes Equipment Failure - + + + + + Data Corruption + Something that acts as or causes Corruption of Data - Here equipment refers to physical equipment - + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - + - - High Risk (RM5x5 S:2 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.40,xsd:decimal + + + + + + Identity Theft + Something that acts as or causes Identity Theft + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + Very Low Risk (RM7x7 S:1 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - 0.49,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - High Risk (RM5x5 S:3 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.48,xsd:decimal - 2022-08-17 + + Risk Matrix + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - + + + + + Non-Normality Bias + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Vulnerability - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - - 2024-02-14 + + + + Public Order Breach + Something that acts as or causes Public Order Breach + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + + + + + + + + Erroneous System Use + Something that acts as or causes Erroneous System Use + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - Monitor Impact - Control that monitors a Risk Impact - + Impact Control + Risk Mitigation Measure that controls Impacts + 2024-05-19 accepted Harshvardhan J. Pandit - + - Very Low Risk - Level where Risk is Very Low + Very High Risk + Level where Risk is Very High - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Very Low Risk (RM7x7 S:1 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - - 0.12,xsd:decimal + + + + + + + Malicious Code Attack + Something that acts as or causes Malicious Code Attack + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + + + + + + Damage + Something that acts as or causes Damage + + 2022-03-30 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + - IEC 31010:2019 - https://www.iso.org/standard/72140.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + + + + 2024-02-14 + accepted + + + + - - High Risk (RM7x7 S:3 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.37,xsd:decimal - 2022-08-17 + + + + + Sexism + Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - Very Low Risk (RM5x5 S:1 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.12,xsd:decimal + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.61,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Coercion - Something that acts as or causes Coercion - - - + + High Risk (RM7x7 S:4 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + + 0.33,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Extremely High Risk - Level where Risk is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + Reduction Control + Control that reduces the likelihood or severity of an event + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Incident Terminated - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - + Incident + An actual or occured event + + + + Incident is realised or materialised risk 2024-02-14 + 2024-05-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + - + + - + - - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources - - 2024-04-14 - 2024-08-16 + + + + + Gender Discrimination + Discrimination based on a person's gender identity or gender expression + + 2024-09-30 accepted - Georg P. Krog, Harshvardhan J. Pandit - + - - + - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - - - 2024-02-14 + + + + + + Data Bias + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - Rule-Based System Design - Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - - Rule based system design also potentially introduces various forms of human cognitive bias - ISO/IEC 24027:2021 - 2024-09-13 + + Reduce Likelihood + Control that reduces the likelihood of an event + + 2024-05-19 accepted - Daniel Doherty + Harshvardhan J. Pandit - + - + - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - 0.20,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - - - 2022-08-19 - 2024-08-16 + + + + + Indirect Discrimination + Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + + 2024-09-30 accepted - Georg P. Krog - + - + - - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations - - This concept was called "ViolationContractualObligations" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified + + 3 Risk Levels + Scale with 3 Risk Levels from High to Low + + 2022-08-18 + accepted Harshvardhan J. Pandit - + - + - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - - - + + + + Lose of Credibility + Something that acts as or causes Loss of Credibility + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + + + + + Nationality Discrimination + Discrimination based on a person's nationality or citizenship + + 2024-09-30 + accepted + + + + - Terrorism - Something that acts as or causes Terrorism - - + + + + + + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Monitor Risk - Control that monitors a Risk - - 2024-05-19 + + + + + + + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Extremely High Risk (RM7x7 S:5 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - 0.61,xsd:decimal + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.64,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Low Severity - Level where Severity is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + Very High Risk (RM5x5 S:5 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + + 0.99,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - - - Risk Concepts - Turtle serialiation + - + - - 5 Severity Levels - Scale with 5 Severity Levels from Very High to Very Low - - 2022-08-18 + + Remove Source + Control that removes the risk source + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.04,xsd:decimal - 2022-08-17 + + + + + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit - + - + - - Risk Matrix - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - - 2024-02-14 + + Risk Matrix 7x7 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM3x3 S:3 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.33,xsd:decimal + Very High Risk (RM7x7 S:4 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.49,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + + + Homophobia + Hostility or prejudice against individuals who are or are perceived to be homosexual + + 2024-09-30 + accepted + + + + - Privacy - + + + + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + + + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals + accepted + + + + + + + + + + + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - High Likelihood - Level where Likelihood is High + Moderate Likelihood + Level where Likelihood is Moderate - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Cognitive Bias - Bias that occurs when humans are processing and interpreting information - - ISO/IEC 24027:2021 - 2024-09-13 + + Extremely High Likelihood + Level where Likelihood is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 accepted - Daniel Doherty + Harshvardhan J. Pandit - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - + - Extorsion - Something that acts as or causes Extorsion - - - + + + + Human Errors + Something that acts as or causes Human Errors + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + + Extremely High Severity + Level where Severity is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - Very Low Risk (RM7x7 S:2 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Extremely Low Risk (RM7x7 S:2 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.12,xsd:decimal + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Primer for Data Privacy Vocabulary - - - - + - - Limitation of Rights - Something that acts as or causes Limitation of Rights - - This concept was called "LimitationOfRights" in DPV 2.0 - 2022-08-18 - 2024-08-16 + + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.99,xsd:decimal + 2022-08-17 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - + - Component Failure - Something that acts as or causes Component Failure - + + + + + Equipment Failure + Something that acts as or causes Equipment Failure - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + + + + + Selection Bias + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - - - - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 - 2024-08-16 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Data Processing Bias - Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - - ISO/IEC 24027:2021 - 2024-09-13 + + + + Disability Discrimination + Discrimination against individuals based on physical or mental disabilities + + 2024-09-30 accepted - Daniel Doherty - + - + - Extremely Low Risk (RM7x7 S:4 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + Moderate Risk (RM7x7 S:6 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - 0.08,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - Sampling Bias - Bias that occurs when data records are not collected randomly from the intended population - - ISO/IEC 24027:2021 - 2024-09-13 + + + + SexualOrientation Discrimination + Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + + 2024-09-30 accepted - Daniel Doherty - + - + - - Confounding Variables Bias - Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - - ISO/IEC 24027:2021 - 2024-09-13 + + + + + + Phishing Scam + Something that acts as or causes Phishing Scam + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty + Harshvardhan J. Pandit - + - + - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - 0.20,xsd:decimal + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Confirmation Bias - Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - - ISO/IEC 24027:2021 - 2024-09-13 + + + + + Injury + Something that acts as or causes Injury + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty + Harshvardhan J. Pandit - + - + - - Security Breach - Something that acts as or causes Security Breach - - - - - + + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Incident Suspected Report - A report describing the suspicion of an incident in the past or occuring - - - 2024-05-19 + + + + + Sampling Bias + Bias that occurs when data records are not collected randomly from the intended population + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - Change Impact - Control that changes Impact - + Integrity Incident + Incident where the integrity of information or system has been affected + + 2024-05-19 accepted + + + + + + + + + + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - - Risk Matrix 5x5 - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - + + + + + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM7x7 S:4 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + Very Low Risk (RM7x7 S:1 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - 0.49,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Remove Impact - Control that removes Impact i.e. prevents it from materialising - + Source Control + Risk Mitigation Measure that controls the Source + 2024-05-19 accepted Harshvardhan J. Pandit - + - - Very Low Likelihood - Level where Likelihood is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + + Extremely Low Risk (RM7x7 S:3 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.06,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - - - - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals - accepted - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion - - - - + + + + + System Failure + Something that acts as or causes System Failure + + Here system refers to both hardware and software systems + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - - + + + + + Primer for Data Privacy Vocabulary + + - + + + + + + + + Erosion of Rights + The gradual weakening or reduction of the scope and protection of rights + + Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + accepted + + + + - Very Low Risk (RM5x5 S:1 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.04,xsd:decimal + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.86,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - 7 Risk Levels - Scale with 7 Risk Levels from Extremely High to Extremely Low - - 2022-08-18 + + + + + Malicious Activity + Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + accepted - Harshvardhan J. Pandit - + - + - Unwanted Disclosure of Data - Something that acts as or causes Unwanted Disclosure of Data - - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 - 2024-08-16 + + + + Denial of Rights + The refusal or withholding or denial of the existence or applicability of rights + + The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Georg P. Krog, Harshvardhan J. Pandit - + - + - - High Risk (RM7x7 S:7 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - 0.43,xsd:decimal - 2022-08-17 + Incident Report + Documented information about an incident, its handling, assessments,and notifications + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - External Security Threat - Concepts associated with security threats that are likely to originate externally - + + + + Individual Health & Safety + accepted - + - + - - High Risk (RM7x7 S:4 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.41,xsd:decimal - 2022-08-17 + + Incident Suspected + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - Incident - An actual or occured event - - - - Incident is realised or materialised risk - 2024-02-14 - 2024-05-19 + + + + + Sexual Violence + Something that acts as or causes Sexual Violence + + + 2022-08-17 2024-08-16 accepted - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - + Harshvardhan J. Pandit - - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Extremely Low Risk (RM7x7 S:2 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + Low Risk (RM7x7 S:2 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - 0.08,xsd:decimal + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Phishing Scam - Something that acts as or causes Phishing Scam - - - + + + + + Authorisation Failure + Something that acts as or causes Authorisation Failure + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Very High Risk (RM7x7 S:7 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - - 0.57,xsd:decimal - 2022-08-17 + Incident Impact Assessment + An impact assessment associated with a incident + + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 + + + + + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + Here equipment refers to physical equipment + + 2022-08-17 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Harshvardhan J. Pandit - + - - + - has incident - Indicates an incident is associated with the specified context - - - 2024-02-14 + + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring + + + 2024-05-19 accepted - + - + - - Change Consequence - Control that changes Consequence - + Accidental Incident + Incident caused due to accidental actions arising from human or human-controlled situations + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + @@ -3955,138 +4422,133 @@ - + - - System Failure - Something that acts as or causes System Failure - - - Here system refers to both hardware and software systems - - 2022-08-17 - 2024-08-16 + + + + + Societal Bias + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - Judicial Costs - Something that involves or causes judicial costs to be paid - + + Very Low Likelihood + Level where Likelihood is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Monitor Consequence - Control that monitors a Risk Consequence - - 2024-05-19 + + Extremely Low Severity + Level where Severity is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM7x7 S:2 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - - 0.29,xsd:decimal + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - - - - 2022-08-17 - 2024-08-16 + + + + + Rule-Based System Design + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + + Rule based system design also potentially introduces various forms of human cognitive bias + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - - - - - - Risk Concepts - N3 serialiation + - + - Incident Concluding Report - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - + Incident Identifier + Identifier associated with an incident + 2024-05-19 accepted - - - - - Remove Source - Control that removes the risk source - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - Low Risk (RM7x7 S:1 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - - 0.14,xsd:decimal + Very Low Risk (RM5x5 S:1 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit + + @@ -4100,621 +4562,858 @@ - + - Incident Mitigation Measure - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - - + + Halt Source + Control that halts the risk source or prevents it from materialising + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification - - - - 2022-08-17 + + + + Violation of Rights + The infringement or breach of rights in a manner that constitues a 'violation' of those rights + + This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + + - - - Low Risk - Level where Risk is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + is exploited by + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - - 7 Likelihood Levels - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - - 2022-08-18 + + + + + Data Aggregation Bias + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + + + + In-Group Bias + Bias that occurs when showing partiality to one's own group or own characteristics + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - + - - Low Risk (RM7x7 S:4 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 + + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Intentional Misuse - Intentional Misuse - + + + + + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Integrity Incident - Incident where the integrity of information or system has been affected - - + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + 2024-05-19 accepted - + - - Incident Suspected - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - - 2024-02-14 + + + + + Out-Group Homogeneity Bias + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large - - accepted - - - - - - - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - - - 2024-05-19 + + + + + + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it + accepted - + - + - - Moderate Likelihood - Level where Likelihood is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + + Low Risk + Level where Risk is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - Accidental Incident - Incident caused due to accidental actions arising from human or human-controlled situations - - - 2024-05-19 + + + + + Reverse Discrimination + Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + + 2024-09-30 accepted - + - + - - Public Order Breach - Something that acts as or causes Public Order Breach - - + + + + + Simpson'S Paradox Bias + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + Very High Risk (RM5x5 S:3 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.60,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Non-Material Damage - Something that acts as or causes Non-Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + + 0.49,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - + - + - Very High Risk (RM5x5 S:5 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - - 0.99,xsd:decimal + Extremely Low Risk (RM7x7 S:1 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - - - 2022-08-17 + + + + + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - + - - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure - - - - 2022-08-17 - 2024-08-16 + + Identification Control + Control to identify characteristics of event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Low Risk (RM5x5 S:5 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - - 0.20,xsd:decimal + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High + + 0.73,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Extremely Low Risk - Level where Risk is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - + - - Consequence Control - Risk Mitigation Measure that controls the Consequences - - 2024-05-19 + + + + + + Component Malfunction + Something that acts as or causes Component Malfunction + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + - + - System Intrusion - Something that acts as or causes System Intrusion - - - - - - 2022-08-17 - 2024-08-16 + + + + Societal Health & Safety + accepted - Harshvardhan J. Pandit - + - + - - Physical Harm - + Incident Detection Report + A report describing the detection of a Incident + + + 2024-05-19 accepted - - - - - - - - - Risk Concepts - JSON-LD serialiation + - + - - Recovery Control - Control to recover from event - - 2024-05-19 + + + + + Implicit Bias + Bias that occurs when a human makes an association or assumption based on their mental models and memories + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - Incident Ongoing - The incident is ongoing i.e. still active - - 2024-02-14 + + Very High Risk (RM5x5 S:5 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.80,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - - + - has control - Indicates the use of specified control - - - 2024-02-14 + + + + + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement + accepted - - + - + - Risk Matrix 7x7 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.67,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Injury - Something that acts as or causes Injury - - + + Very High Risk (RM7x7 S:3 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + + 0.43,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:4 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.33,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Low Risk (RM7x7 S:2 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 + + + + + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + + + + Age Discrimination + Discrimination based on a person's age, often impacting older or younger individuals + + 2024-09-30 + accepted + + - + - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - + + + + Psychological Harm + Something that acts as or causes Psychological Harm + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Moderate Risk - Level where Risk is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + + + + Operational Security Risk + Risks and issues that arise during operational processes + accepted - Harshvardhan J. Pandit - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + + + Coercion + Something that acts as or causes Coercion + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Incident Concluding Report + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + + 2024-05-19 + accepted + + - + + + + + + + + Informativeness Bias + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + Incident Handling Report + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + + + 2024-05-19 + accepted + + + + + + + Incident Notice + Notice associated with an Incident + + + 2024-05-19 + accepted + + + + + + + + Incident Terminated + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Lose of Reputation + Something that acts as or causes Loss of Reputation + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - Very High Risk (RM5x5 S:4 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - - 0.80,xsd:decimal + Extremely High Risk (RM7x7 S:5 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + + 0.61,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + - Risk Matrix 3x3 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Selection Bias - Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - - ISO/IEC 24027:2021 - 2024-09-13 + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + + ISO 31073:2022 Risk management vocabulary + 2024-06-12 accepted - Daniel Doherty - + - + - Very High Risk (RM7x7 S:4 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - - 0.57,xsd:decimal + High Risk (RM5x5 S:3 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - High Severity - Level where Severity is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + + + + + + + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + accepted - Harshvardhan J. Pandit - + - - - - - - - Risk Concepts - RDF/XML serialiation - - + - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html + + + + + + + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Very Low Risk + Level where Risk is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + + + + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + Very High Risk (RM7x7 S:4 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + + 0.57,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + + accepted + + + + + + + + + + Detriment + Something that acts as or causes Detriment + + 2022-03-23 + 2024-08-16 + accepted + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + + + + + + + + + + Copyright Violation + Something that acts as or causes Copyright Violation + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - Reduction Control - Control that reduces the likelihood or severity of an event - + Change Impact + Control that changes Impact + 2024-05-19 accepted + Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Threat + Risk source event which causes Risk + + + 2024-02-14 + accepted + + @@ -4728,293 +5427,405 @@ - + - Operational Security Risk - Risks and issues that arise during operational processes - + + + + + + Spoofing + Something that acts as or causes Spoofing + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + is vulnerability of + Indicates the vulnerability (subject) is associated with indicated context (object) + + + 2024-02-14 + accepted + + + + - Moderate Risk (RM7x7 S:2 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - - 0.24,xsd:decimal + Very Low Risk (RM5x5 S:1 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Extremely Low Risk + Level where Risk is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Direct Discrimination + Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + + 2024-09-30 + accepted + + + + + + + + + + User Risks + Concepts associated with risks that arise due to User or Human use + + accepted + + + + + + + + + + + Cognitive Bias + Bias that occurs when humans are processing and interpreting information + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:4 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.24,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Incident Near Miss + The state where an incident was almost successful in taking place i.e. "it came very close" + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.37,xsd:decimal - 2022-08-17 + + High Likelihood + Level where Likelihood is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Identification Control - Control to identify characteristics of event - + + + + + Physical Harm + + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + Risk Control + Control that modifies risk + + 2024-05-19 accepted + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Extremely High Risk + Level where Risk is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - Moderate Risk (RM5x5 S:3 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + Low Risk (RM5x5 S:2 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - 0.24,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - User Risks - Concepts associated with risks that arise due to User or Human use - + + Monitor Control + Control that monitors another Control + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + Vulnerability + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + 2024-02-14 accepted - + - + - - Impact Control - Risk Mitigation Measure that controls Impacts - - 2024-05-19 + + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.32,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - - Guides for Data Privacy Vocabulary - - + + + + + Risk Concepts - JSON-LD serialiation - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Malware Attack - Something that acts as or causes Malware Attack - - - - - - 2022-08-17 - 2024-08-16 + + 7 Severity Levels + Scale with 7 Severity Levels from Extremely High to Extremely Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - - accepted - - - - - - - + - Incident Notice - Notice associated with an Incident - - - 2024-05-19 + + Incident Concluded + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Component Malfunction - Something that acts as or causes Component Malfunction - - - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - - - - - - - Threat Source - Source of threat event, including both agent and non-agent sources - - 2024-02-14 - accepted - - - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - - Source Control - Risk Mitigation Measure that controls the Source - + Incident Register + A register recording incidentes, their reports, notifications, and other related activities + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment @@ -5024,61 +5835,88 @@ Risk Concepts - HTML serialiation - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + + + Incident Preliminary Report + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + + + 2024-05-19 + accepted + + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Implicit Bias - Bias that occurs when a human makes an association or assumption based on their mental models and memories - - ISO/IEC 24027:2021 - 2024-09-13 + + Remedy Control + Control to remedy consequences of event + + 2024-05-19 accepted - Daniel Doherty - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + Examples for Data Privacy Vocabulary + + + + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Cross-Border Incident - Incident involving cross-border or multiple jurisdictions + Confidentiality Incident + Incident where the confidentiality of information or system has been affected 2024-05-19 @@ -5086,48 +5924,66 @@ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + + Harassment + + accepted + + - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + + + + Guides for Data Privacy Vocabulary + + - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html @@ -5135,4 +5991,32 @@ + + + + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + + + + + + + + + + + + diff --git a/2.1-dev/risk/risk.ttl b/2.1-dev/risk/risk.ttl index f2f9ba46b..21d4791d7 100644 --- a/2.1-dev/risk/risk.ttl +++ b/2.1-dev/risk/risk.ttl @@ -137,17 +137,38 @@ risk:AccidentalIncident a rdfs:Class, risk:AccidentalMisuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:UserRisks ; + skos:broader risk:Misuse ; skos:definition "Accidental Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Accidental Misuse"@en . +risk:AgeDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's age, often impacting older or younger individuals"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Age Discrimination"@en . + risk:AuthorisationFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -156,21 +177,35 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Authorisation Failure"@en . risk:AvailabilityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:DataBreach ; - skos:inScheme risk:risk-consequences-classes . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-taxonomy-classes . + +risk:AvailabilityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Availability' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Availability Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . risk:AvailabilityIncident a rdfs:Class, skos:Concept ; @@ -197,33 +232,43 @@ risk:AvoidSource a rdfs:Class, risk:Benefit a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Compensation ; skos:definition "Something that acts as or causes benefits"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Benefit"@en . risk:Bias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RiskConcept ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Bias"@en . risk:Blackmail a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -232,15 +277,18 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Blackmail"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Blackmail"@en . risk:BruteForceAuthorisations a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -249,13 +297,25 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Brute Force Authorisations"@en . +risk:CasteDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's caste, a form of social stratification found in some cultures"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Caste Discrimination"@en . + risk:ChangeConsequence a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -282,7 +342,11 @@ risk:ChangeImpact a rdfs:Class, risk:Coercion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -291,65 +355,82 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Coercion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coercion"@en . risk:CognitiveBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Bias ; skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cognitive Bias"@en . risk:Compensation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides compensation - which can be monetary and financial or in other forms"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compensation"@en . risk:ComponentFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . risk:ComponentMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . risk:CompromiseAccount a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -358,17 +439,18 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account"@en . risk:CompromiseAccountCredentials a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -377,15 +459,18 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account Credentials"@en . risk:ConfidentialityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -394,12 +479,24 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:DataBreach ; + skos:broader risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confidentiality Breach"@en . +risk:ConfidentialityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Confidentiality Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . + risk:ConfidentialityIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -413,28 +510,34 @@ risk:ConfidentialityIncident a rdfs:Class, risk:ConfirmationBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confirmation Bias"@en . risk:ConfoundingVariablesBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:StatisticalBias ; skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confounding Variables Bias"@en . risk:ConsequenceControl a rdfs:Class, @@ -462,7 +565,9 @@ risk:ContainmentControl a rdfs:Class, risk:CopyrightViolation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -471,22 +576,25 @@ risk:CopyrightViolation a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Copyright Violation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Copyright Violation"@en . risk:CoverageBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SelectionBias ; skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coverage Bias"@en . risk:CrossBorderIncident a rdfs:Class, @@ -502,7 +610,10 @@ risk:CrossBorderIncident a rdfs:Class, risk:Cryptojacking a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -511,15 +622,17 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Cryptojacking"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cryptojacking"@en . risk:Damage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -527,38 +640,50 @@ risk:Damage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Damage"@en . risk:DataAggregationBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBias ; skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Aggregation Bias"@en . risk:DataBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Bias ; skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Bias"@en . risk:DataBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -569,17 +694,18 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:SecurityBreach ; + skos:broader risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Breach"@en . risk:DataCorruption a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -588,24 +714,26 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . risk:DataProcessingBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBias ; skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Processing Bias"@en . risk:DeliberateIncident a rdfs:Class, @@ -621,7 +749,10 @@ risk:DeliberateIncident a rdfs:Class, risk:DenialServiceAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -630,10 +761,9 @@ risk:DenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk:DetectionControl a rdfs:Class, @@ -649,7 +779,9 @@ risk:DetectionControl a rdfs:Class, risk:Detriment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -657,25 +789,63 @@ risk:Detriment a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Detriment"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Detriment"@en . +risk:DirectDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Direct Discrimination"@en . + +risk:DisabilityDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination against individuals based on physical or mental disabilities"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Disability Discrimination"@en . + risk:Discrimination a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date ; + dct:created "2022-08-19"^^xsd:date, + "2024-09-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Discrimination"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RiskConcept, + risk:SocietalRisk ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, + "Something that acts as or causes Discrimination"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Discrimination"@en . risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -684,10 +854,9 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:DenialServiceAttack ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . risk:EnvironmentalIncident a rdfs:Class, @@ -703,17 +872,24 @@ risk:EnvironmentalIncident a rdfs:Class, risk:EnvironmentalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Environmental Risk"@en . risk:EquipmentFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -722,16 +898,19 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . risk:EquipmentMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -740,16 +919,18 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . risk:ErroneousSystemUse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -760,12 +941,43 @@ risk:ErroneousSystemUse a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Erroneous System Use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Erroneous System Use"@en . +risk:EthnicDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Racism ; + skos:definition "Discrimination against individuals based on their ethnicity or cultural heritage"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Ethnic Discrimination"@en . + +risk:ExcellenceDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Favoritism towards individuals deemed more competent or superior, often at the expense of others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Excellence Discrimination"@en . + risk:ExposureToHarmfulSpeech a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -776,23 +988,28 @@ risk:ExposureToHarmfulSpeech a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Harmful Speech"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . risk:ExternalSecurityThreat a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "External Security Threat"@en . risk:Extorsion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -801,10 +1018,9 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Extorsion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Extorsion"@en . risk:ExtremelyHighLikelihood a rdfs:Class, @@ -891,33 +1107,25 @@ risk:ExtremelyLowSeverity a rdfs:Class, skos:prefLabel "Extremely Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1"@en . -risk:Fee a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; - dct:created "2024-04-14"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source "DGA 2.10"@en ; - rdfs:isDefinedBy risk: ; - sw:term_status "modified"@en ; - skos:broader risk:FinancialImpact ; - skos:definition "Something that acts as or provides fees e.g. for using a service"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Fee"@en . - risk:FinancialImpact a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Impact"@en . risk:FinancialLoss a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -928,12 +1136,16 @@ risk:FinancialLoss a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Loss"@en . risk:Fraud a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -942,23 +1154,53 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Fraud"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Fraud"@en . +risk:GenderDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Discrimination based on a person's gender identity or gender expression"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Gender Discrimination"@en . + +risk:GeographicDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's geographical origin or residence"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Geographic Discrimination"@en . + risk:GroupAttributionBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Group Attribution Bias"@en . risk:HaltSource a rdfs:Class, @@ -973,9 +1215,24 @@ risk:HaltSource a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Halt Source"@en . +risk:Harassment a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Harassment"@en . + risk:Harm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-13"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -983,7 +1240,7 @@ risk:Harm a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; skos:definition "Something that acts as or causes Harm to humans"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -1035,9 +1292,26 @@ risk:HighSeverity a rdfs:Class, skos:prefLabel "High Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1"@en . +risk:Homophobia a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SexualOrientationDiscrimination ; + skos:definition "Hostility or prejudice against individuals who are or are perceived to be homosexual"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Homophobia"@en . + risk:HumanErrors a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1048,7 +1322,7 @@ risk:HumanErrors a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Human Errors"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Human Errors"@en . risk:IdentificationControl a rdfs:Class, @@ -1064,7 +1338,11 @@ risk:IdentificationControl a rdfs:Class, risk:IdentityFraud a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1073,15 +1351,18 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Identity Fraud"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Fraud"@en . risk:IdentityTheft a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1090,15 +1371,16 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Identity Theft"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Theft"@en . risk:IllegalDataProcessing a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1109,7 +1391,7 @@ risk:IllegalDataProcessing a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -1127,28 +1409,34 @@ risk:ImpactControl a rdfs:Class, risk:ImplicitBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Implicit Bias"@en . risk:InGroupBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "In-Group Bias"@en . risk:Incident a rdfs:Class, @@ -1423,39 +1711,65 @@ risk:IncidentTerminated a rdfs:Class, skos:inScheme risk:incident-status-classes ; skos:prefLabel "Incident Terminated"@en . +risk:IndirectDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Indirect Discrimination"@en . + risk:IndividualHealthSafety a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Health & Safety"@en . risk:IndividualRisk a rdfs:Class, - skos:Concept ; + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Risk"@en . risk:InformativenessBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:EngineeringDecisionBias ; skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Informativeness Bias"@en . risk:Injury a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1464,19 +1778,35 @@ risk:Injury a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Injury"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Injury"@en . risk:IntegrityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach, - risk:IntegrityConcept ; - skos:inScheme risk:risk-consequences-classes . + skos:broader risk:DataBreach ; + skos:inScheme risk:risk-taxonomy-classes . + +risk:IntegrityConcept a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Integrity Concept"@en ; + skos:scopeNote "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact"@en . risk:IntegrityIncident a rdfs:Class, skos:Concept ; @@ -1491,17 +1821,24 @@ risk:IntegrityIncident a rdfs:Class, risk:IntentionalMisuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:UserRisks ; + skos:broader risk:Misuse ; skos:definition "Intentional Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intentional Misuse"@en . risk:InterceptCommunications a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1510,46 +1847,70 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Interception of Communications"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . risk:JudicialCosts a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:FinancialLoss ; skos:definition "Something that involves or causes judicial costs to be paid"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Judicial Costs"@en . risk:JudicialPenalty a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:FinancialLoss ; skos:definition "Something that involves or causes judicial penalties to be paid"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Judicial Penalty"@en . +risk:LanguageDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Language Discrimination"@en . + risk:LegalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Legal Risk"@en . risk:LoseCredibility a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1560,12 +1921,15 @@ risk:LoseCredibility a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Credibility"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Credibility"@en . risk:LoseCustomerConfidence a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1576,12 +1940,15 @@ risk:LoseCustomerConfidence a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Customer Confidence"@en . risk:LoseGoodwill a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1592,12 +1959,15 @@ risk:LoseGoodwill a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Goodwill"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Goodwill"@en . risk:LoseNegotiatingCapacity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1608,12 +1978,15 @@ risk:LoseNegotiatingCapacity a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Negotiating Capacity"@en . risk:LoseOpportunity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1624,12 +1997,15 @@ risk:LoseOpportunity a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Opportunity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Opportunity"@en . risk:LoseReputation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1640,12 +2016,15 @@ risk:LoseReputation a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Reputation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Reputation"@en . risk:LoseTrust a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1656,7 +2035,7 @@ risk:LoseTrust a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; skos:definition "Something that acts as or causes Loss of Trust"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Trust"@en . risk:LowLikelihood a rdfs:Class, @@ -1707,9 +2086,27 @@ risk:LowSeverity a rdfs:Class, skos:prefLabel "Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1"@en . +risk:MaliciousActivity a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ExternalSecurityThreat ; + skos:definition "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Malicious Activity"@en . + risk:MaliciousCodeAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1718,17 +2115,19 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malicious Code Attack"@en . risk:MalwareAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1737,17 +2136,17 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes Malware Attack"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malware Attack"@en . risk:MaterialDamage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1755,13 +2154,44 @@ risk:MaterialDamage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Material Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk:Misandry a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Dislike, contempt, or prejudice against men"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Misandry"@en . + +risk:Misogyny a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Dislike, contempt, or prejudice against women"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Misogyny"@en . + risk:Misuse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Delaram Golpayegani" ; dct:created "2024-06-11"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1769,7 +2199,7 @@ risk:Misuse a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; skos:definition "Something that acts as or causes Misuse"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Misuse"@en . risk:ModerateLikelihood a rdfs:Class, @@ -1905,9 +2335,26 @@ risk:MonitorVulnerabilities a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Monitor Vulnerabilities"@en . +risk:NationalityDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's nationality or citizenship"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Nationality Discrimination"@en . + risk:NonMaterialDamage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1915,75 +2362,92 @@ risk:NonMaterialDamage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Non-Material Damage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . risk:NonNormalityBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:StatisticalBias ; skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Normality Bias"@en . risk:NonResponseBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SelectionBias ; skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Response Bias"@en . risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that arise during operational processes"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Operational Security Risk"@en . risk:OutGroupHomogeneityBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Out-Group Homogeneity Bias"@en . risk:Payment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides payment e.g. to access a service or purchase resources"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Payment"@en . risk:PersonalSafetyEndangerment a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -1994,12 +2458,16 @@ risk:PersonalSafetyEndangerment a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Personal Safety Endangerment"@en . risk:PhishingScam a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2008,15 +2476,17 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Phishing Scam"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Phishing Scam"@en . risk:PhysicalAssault a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2025,32 +2495,93 @@ risk:PhysicalAssault a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Physical Assault"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Assault"@en . risk:PhysicalHarm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Harm"@en . +risk:PotentialConsequence a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'consequence concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Consequence"@en ; + skos:scopeNote "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialImpact a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'impact' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Impact"@en ; + skos:scopeNote "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialRisk a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'risk' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential Risk"@en ; + skos:scopeNote "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + +risk:PotentialRiskSource a rdfs:Class, + skos:Concept ; + dct:contributor "Harshvardhan J. Pandit" ; + dct:created "2024-09-29"^^xsd:date ; + rdfs:isDefinedBy risk: ; + rdfs:subClassOf dpv:RiskConcept ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Indicates a concept can potentially be a 'risk source' concept within an use-case"@en ; + skos:inScheme risk:core-classes ; + skos:prefLabel "Potential RiskSource"@en ; + skos:scopeNote "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case"@en . + risk:Privacy a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Privacy"@en . risk:PsychologicalHarm a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2059,14 +2590,16 @@ risk:PsychologicalHarm a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Psychological Harm"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Psychological Harm"@en . risk:PublicOrderBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -2077,7 +2610,7 @@ risk:PublicOrderBreach a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:LegalRisk ; skos:definition "Something that acts as or causes Public Order Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Public Order Breach"@en . risk:RM3x3S1L1 a rdfs:Class, @@ -3159,6 +3692,34 @@ risk:RM7x7S7L7 a rdfs:Class, skos:inScheme risk:risk-matrix-classes ; skos:prefLabel "Extremely High Risk (RM7x7 S:7 L:7)"@en . +risk:RacialDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Racism ; + skos:definition "Discrimination against individuals because of their racial background or skin color"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Racial Discrimination"@en . + +risk:Racism a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Prejudice or discrimination against people based on their race"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Racism"@en . + risk:RecoveryControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -3207,19 +3768,36 @@ risk:ReductionControl a rdfs:Class, risk:Reidentification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . +risk:ReligiousDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's religious beliefs or practices"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Religious Discrimination"@en . + risk:RemedyControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -3269,7 +3847,10 @@ risk:RemoveSource a rdfs:Class, risk:Renumeration a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3277,63 +3858,134 @@ risk:Renumeration a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; skos:definition "Something that acts as or provides renumeration which is in monetary or financial form"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Remuneration"@en . risk:ReputationalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reputational Risk"@en . risk:RequirementsBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs in or during requirements creation"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Requirements Bias"@en ; skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . +risk:ReverseDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Reverse Discrimination"@en . + risk:Reward a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2024-04-14"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:FinancialImpact ; + skos:broader risk:Renumeration ; skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reward"@en . +risk:RightEroded a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Erosion of Rights"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightObstructed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Obstruction of Rights"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightsDenial a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Denial of Rights"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk:RightsExercisePrevention a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Prevent Exercising of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Prevent Exercising of Rights"@en ; - skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsImpact a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3342,40 +3994,59 @@ risk:RightsImpact a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:Impact, - risk:SocietalRisk ; + skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Impact to Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Impact to Rights"@en ; - skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsLimitation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Limitation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Limitation of Rights"@en ; - skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + +risk:RightsUnfulfilled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Failure to meet or complete the fulfilment of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Unfulfilment of Rights"@en ; + skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsViolation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog, Harshvardhan J. Pandit" ; dct:created "2022-08-18"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Violation of Rights"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:broader risk:RightsImpact ; + skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Rights"@en ; - skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0"@en . + skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RiskAnalysis a rdfs:Class, skos:Concept ; @@ -3492,21 +4163,29 @@ risk:RiskSource a rdfs:Class, risk:RuleBasedSystemDesign a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Rule-Based System Design"@en ; skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . risk:Sabotage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3515,29 +4194,34 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Sabotage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sabotage"@en . risk:SamplingBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SelectionBias ; skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sampling Bias"@en . risk:Scam a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3546,28 +4230,35 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Scam"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Scam"@en . risk:SecurityAttack a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Attack"@en . risk:SecurityBreach a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3576,30 +4267,87 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Breach"@en . risk:SelectionBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:StatisticalBias ; skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Selection Bias"@en . +risk:SexDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Discrimination based on a person's biological sex"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sex Discrimination"@en . + +risk:Sexism a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sexism"@en . + +risk:SexualHarassment a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Harm ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Sexual Harassment"@en . + +risk:SexualOrientationDiscrimination a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Discrimination ; + skos:definition "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "SexualOrientation Discrimination"@en . + risk:SexualViolence a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3608,9 +4356,9 @@ risk:SexualViolence a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Sexual Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sexual Violence"@en . risk:ShareRisk a rdfs:Class, @@ -3627,20 +4375,26 @@ risk:ShareRisk a rdfs:Class, risk:SimpsonsParadoxBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBias ; skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Simpson'S Paradox Bias"@en . risk:SocialDisadvantage a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3648,39 +4402,48 @@ risk:SocialDisadvantage a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Social Disadvantage"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Social Disadvantage"@en . risk:SocietalBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:CognitiveBias ; skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Bias"@en . risk:SocietalHealthSafety a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Health & Safety"@en . risk:SocietalRisk a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Risk"@en . risk:SourceControl a rdfs:Class, @@ -3697,42 +4460,48 @@ risk:SourceControl a rdfs:Class, risk:Spoofing a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:MaliciousActivity ; skos:definition "Something that acts as or causes Spoofing"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Spoofing"@en . risk:StatisticalBias a rdfs:Class, skos:Concept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource, risk:RiskConcept ; - dct:contributor "Daniel Doherty" ; + dct:contributor "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" ; dct:created "2024-09-13"^^xsd:date ; dct:source "ISO 20501:2019"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBias ; skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; - skos:inScheme risk:bias-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Statistical Bias"@en . risk:SystemFailure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3741,16 +4510,20 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:SystemIntrusion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3759,17 +4532,18 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:SecurityAttack ; skos:definition "Something that acts as or causes System Intrusion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Intrusion"@en . risk:SystemMalfunction a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3778,16 +4552,18 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:OperationalSecurityRisk ; + skos:broader risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . risk:Terrorism a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3798,7 +4574,7 @@ risk:Terrorism a rdfs:Class, sw:term_status "accepted"@en ; skos:broader risk:SocietalRisk ; skos:definition "Something that acts as or causes Terrorism"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Terrorism"@en . risk:Threat a rdfs:Class, @@ -3822,9 +4598,29 @@ risk:ThreatSource a rdfs:Class, skos:inScheme risk:core-classes ; skos:prefLabel "Threat Source"@en . +risk:Transphobia a rdfs:Class, + skos:Concept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:RiskConcept ; + dct:created "2024-09-30"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Sexism ; + skos:definition "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Transphobia"@en . + risk:UnauthorisedAccesstoPremises a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3833,30 +4629,35 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . risk:UnauthorisedActivity a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Activity"@en . risk:UnauthorisedCodeAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3865,16 +4666,18 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Access"@en . risk:UnauthorisedCodeDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3883,15 +4686,18 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk:UnauthorisedCodeModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3900,15 +4706,18 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Modification"@en . risk:UnauthorisedDataAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3917,15 +4726,18 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Access"@en . risk:UnauthorisedDataDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3934,15 +4746,18 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk:UnauthorisedDataModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3951,15 +4766,18 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Modification"@en . risk:UnauthorisedInformationDisclosure a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3968,29 +4786,35 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk:UnauthorisedReidentification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Georg P. Krog" ; dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . risk:UnauthorisedResourceUse a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -3999,15 +4823,19 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Resource Use"@en . risk:UnauthorisedSystemAccess a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4016,16 +4844,18 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Access"@en . risk:UnauthorisedSystemModification a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4034,15 +4864,19 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Modification"@en . risk:UnwantedCodeDeletion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4051,16 +4885,19 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Code Deletion"@en . risk:UnwantedDataDeletion a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:AvailabilityConcept, + risk:IntegrityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4069,16 +4906,18 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:AvailabilityConcept, - risk:ExternalSecurityThreat, - risk:IntegrityConcept ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Data Deletion"@en . risk:UnwantedDisclosureData a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:ConfidentialityConcept, + risk:PotentialConsequence, + risk:PotentialRisk, + risk:PotentialRiskSource ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4087,20 +4926,21 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ConfidentialityConcept, - risk:ExternalSecurityThreat ; + skos:broader risk:UnauthorisedActivity ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk:UserRisks a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialRisk, + risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "User Risks"@en . risk:VeryHighLikelihood a rdfs:Class, @@ -4195,7 +5035,9 @@ risk:VeryLowSeverity a rdfs:Class, risk:ViolatingCodeOfConduct a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4204,15 +5046,17 @@ risk:ViolatingCodeOfConduct a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . risk:ViolatingContractualObligation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4221,15 +5065,17 @@ risk:ViolatingContractualObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk:ViolatingEthicsCode a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4238,15 +5084,17 @@ risk:ViolatingEthicsCode a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . risk:ViolatingLegalObligation a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4255,25 +5103,29 @@ risk:ViolatingLegalObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Legal Obligations"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . risk:ViolatingPolicy a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Policy"@en . risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4282,15 +5134,18 @@ risk:ViolatingStatutoryObligations a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:LegalRisk ; + skos:broader risk:ViolatingObligation ; skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violation of Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk:ViolenceAgainstChildren a rdfs:Class, skos:Concept, - dpv:RiskConcept ; + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit" ; dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; @@ -4299,9 +5154,9 @@ risk:ViolenceAgainstChildren a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:IndividualRisk ; + skos:broader risk:Harm ; skos:definition "Something that acts as or causes Child Violence"@en ; - skos:inScheme risk:risk-consequences-classes ; + skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . @@ -4556,15 +5411,13 @@ risk:serialisation-ttl a profile:ResourceDescriptor ; profile:hasArtifact ; profile:hasRole role:guidance . -risk:core-classes a skos:ConceptScheme . - risk:incident-status-classes a skos:ConceptScheme . risk:core-properties a skos:ConceptScheme . -risk:incident-classes a skos:ConceptScheme . +risk:core-classes a skos:ConceptScheme . -risk:bias-classes a skos:ConceptScheme . +risk:incident-classes a skos:ConceptScheme . risk:risk-controls-classes a skos:ConceptScheme . @@ -4572,5 +5425,5 @@ risk:risk-levels-classes a skos:ConceptScheme . risk:risk-matrix-classes a skos:ConceptScheme . -risk:risk-consequences-classes a skos:ConceptScheme . +risk:risk-taxonomy-classes a skos:ConceptScheme . diff --git a/2.1-dev/search.html b/2.1-dev/search.html index e04f55848..7fb7afc56 100644 --- a/2.1-dev/search.html +++ b/2.1-dev/search.html @@ -107,7 +107,7 @@

    DPV Search Index

    -

    Search through 6880 classes and 199 properties from DPV specifications version 2.1-dev.
    +

    Search through 7043 classes and 205 properties from DPV specifications version 2.1-dev.
    Purl for this page: https://w3id.org/dpv/2.1-dev/search

    @@ -126,7 +126,7 @@

    DPV Search Index

    + \ No newline at end of file diff --git a/code/vocab_csv/Risk.csv b/code/vocab_csv/Risk.csv index 62aefcb97..9562d9642 100644 --- a/code/vocab_csv/Risk.csv +++ b/code/vocab_csv/Risk.csv @@ -25,13 +25,13 @@ RiskOwner,,Entity accountable for managing risk,risk:RiskManagement,sc,,,,,,,,pr ,,,,,,,,,,,,,, RiskMatrix,Risk Matrix,Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.,,risk:RiskAssessment,,,,,"(IEC 31010:2019,https://www.iso.org/standard/72140.html)",2024-02-14,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,, -,,,,,,,,,,,,,, -,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +PotentialRisk,Potential Risk,Indicates a concept can potentially be a 'risk' concept within an use-case,dpv:RiskConcept,sc,,,,PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,,2024-09-29,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,, +PotentialRiskSource,Potential RiskSource,Indicates a concept can potentially be a 'risk source' concept within an use-case,dpv:RiskConcept,sc,,,,PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,,2024-09-29,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,, +PotentialConsequence,Potential Consequence,Indicates a concept can potentially be a 'consequence concept within an use-case,dpv:RiskConcept,sc,,,,PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,,2024-09-29,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +PotentialImpact,Potential Impact,Indicates a concept can potentially be a 'impact' concept within an use-case,dpv:RiskConcept,sc,,,,PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,,2024-09-29,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +ConfidentialityConcept,Confidentiality Concept,Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model,dpv:RiskConcept,sc,,,,"This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact",,2024-09-29,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +IntegrityConcept,Integrity Concept,Indicates a concept is relevant to 'Integrity' in CIA InfoSec model,dpv:RiskConcept,sc,,,,"This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact",,2024-09-29,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +AvailabilityConcept,Availability Concept,Indicates a concept is relevant to 'Availability' in CIA InfoSec model,dpv:RiskConcept,sc,,,,"This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact",,2024-09-29,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,, diff --git a/code/vocab_csv/RiskConsequences.csv b/code/vocab_csv/RiskConsequences.csv index 00ab0f50f..06ee6b04b 100644 --- a/code/vocab_csv/RiskConsequences.csv +++ b/code/vocab_csv/RiskConsequences.csv @@ -1,991 +1,1001 @@ -Term,Label,Definition,ParentTerm,ParentType,Value,CIA,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution,,,,,,,,,,,,,,,,, -UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Misuse,Misuse,Something that acts as or causes Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,2024-06-11,2024-08-16,accepted,Delaram Golpayegani,,,,,,,,,,,,,,,,,, -IntentionalMisuse,Intentional Misuse,Intentional Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -AccidentalMisuse,Accidental Misuse,Accidental Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,risk:UserRisks,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -HumanErrors,Human Errors,Something that acts as or causes Human Errors,risk:UserRisks,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Term,Label,Definition,ParentTerm,ParentType,Value,Role,CIA,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution,,,,,,,,,,,,,,,,, +UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,,dpv:RiskConcept,,"S,R",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Misuse,Misuse,Something that acts as or causes Misuse,risk:UserRisks,dpv:RiskConcept,,"S,R,C",,,,,,2024-06-11,2024-08-16,accepted,Delaram Golpayegani,,,,,,,,,,,,,,,,,, +IntentionalMisuse,Intentional Misuse,Intentional Misuse,risk:Misuse,dpv:RiskConcept,,"S,R,C",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +AccidentalMisuse,Accidental Misuse,Accidental Misuse,risk:Misuse,dpv:RiskConcept,,"S,R,C",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,risk:UserRisks,dpv:RiskConcept,,"S,R,C",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +HumanErrors,Human Errors,Something that acts as or causes Human Errors,risk:UserRisks,dpv:RiskConcept,,"S,R,C",,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ENISA Threat Landscape 2021,https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,,,,accepted,,,,,,,,,,,,,,,,,,, -UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Sabotage,Sabotage,Something that acts as or causes Sabotage,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Blackmail,Blackmail,Something that acts as or causes Blackmail,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Coercion,Coercion,Something that acts as or causes Coercion,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Extorsion,Extorsion,Something that acts as or causes Extorsion,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Fraud,Fraud,Something that acts as or causes Fraud,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Scam,Scam,Something that acts as or causes Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,"This concept was called ""InterceptionCommunications"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -SecurityBreach,Security Breach,Something that acts as or causes Security Breach,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DataBreach,Data Breach,Something that acts as or causes Data Breach,risk:SecurityBreach,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,risk:DataBreach,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IntegrityBreach,,,risk:DataBreach,dpv:RiskConcept,,I,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -AvailabilityBreach,,,risk:DataBreach,dpv:RiskConcept,,A,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,risk:OperationalSecurityRisk,dpv:RiskConcept,,I,,,"This concept was called ""Corruption Data"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I",,,,"(ENISa Trust Services Security Incidents 2021,https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Reidentification,Re-identification,Something that acts as or causes Re-identification,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,,2022-08-19,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, -IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemFailure,System Failure,Something that acts as or causes System Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here system refers to both hardware and software systems,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here system refers to both hardware and software systems,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ComponentFailure,Component Failure,Something that acts as or causes Component Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, -ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""IllegalProcessingData"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,risk:LegalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationContractualObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,risk:LegalRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationCodeConduct"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationEthicalCode"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,risk:LegalRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Detriment,Detriment,Something that acts as or causes Detriment,risk:LegalRisk,dpv:RiskConcept,,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Damage,Damage,Something that acts as or causes Damage,risk:LegalRisk,dpv:RiskConcept,,,,,,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MaterialDamage,Material Damage,Something that acts as or causes Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,,dpv:RiskConcept,,S,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,risk:ExternalSecurityThreat,dpv:RiskConcept,,"S,R","C,I,A",,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,risk:SecurityAttack,dpv:RiskConcept,,"S,R",A,,,,"(ENISA Threat Landscape 2021,https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),risk:SecurityAttack,dpv:RiskConcept,,"S,R",A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),risk:DenialServiceAttack,dpv:RiskConcept,,"S,R",A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,risk:SecurityAttack,dpv:RiskConcept,,"S,R","C,I",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,risk:SecurityAttack,dpv:RiskConcept,,"S,R","C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,risk:SecurityAttack,dpv:RiskConcept,,"S,R","C,I,A",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,risk:SecurityAttack,dpv:RiskConcept,,"S,R","C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,risk:ExternalSecurityThreat,dpv:RiskConcept,,"S,R,C","C,I,A",,,,,,,accepted,,,,,,,,,,,,,,,,,,, +UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C","C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C","C,I",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",I,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",I,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",C,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C","C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",I,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C","I,A",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C","I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,risk:UnauthorisedActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MaliciousActivity,Malicious Activity,"Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others",risk:ExternalSecurityThreat,dpv:RiskConcept,,"S,R,C",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C","C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Sabotage,Sabotage,Something that acts as or causes Sabotage,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C","I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Blackmail,Blackmail,Something that acts as or causes Blackmail,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Coercion,Coercion,Something that acts as or causes Coercion,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Extorsion,Extorsion,Something that acts as or causes Extorsion,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Fraud,Fraud,Something that acts as or causes Fraud,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Scam,Scam,Something that acts as or causes Scam,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,"This concept was called ""InterceptionCommunications"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,risk:MaliciousActivity,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,risk:ExternalSecurityThreat,dpv:RiskConcept,,"S,R,C","C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,risk:ExternalSecurityThreat,dpv:RiskConcept,,"S,R,C",C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,,dpv:RiskConcept,,"S,R",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +SecurityBreach,Security Breach,Something that acts as or causes Security Breach,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C","C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DataBreach,Data Breach,Something that acts as or causes Data Breach,risk:SecurityBreach,dpv:RiskConcept,,"S,R,C","C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,risk:DataBreach,dpv:RiskConcept,,"S,R,C",C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IntegrityBreach,,,risk:DataBreach,dpv:RiskConcept,,"S,R,C",I,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +AvailabilityBreach,,,risk:DataBreach,dpv:RiskConcept,,"S,R,C",A,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C",I,,,"This concept was called ""Corruption Data"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R","C,I",,,,"(ENISa Trust Services Security Incidents 2021,https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Reidentification,Re-identification,Something that acts as or causes Re-identification,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C",C,,,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,,2022-08-19,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C",A,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C",A,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemFailure,System Failure,Something that acts as or causes System Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C",A,,,Here system refers to both hardware and software systems,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C",A,,,Here system refers to both hardware and software systems,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ComponentFailure,Component Failure,Something that acts as or causes Component Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C",A,,,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, +ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,"S,R,C",A,,,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,,dpv:RiskConcept,,"R,C",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,risk:LegalRisk,dpv:RiskConcept,,"R,C",,,,"This concept was called ""IllegalProcessingData"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,risk:LegalRisk,dpv:RiskConcept,,"R,C",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingObligation,Violating Obligation,"Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract",risk:LegalRisk,dpv:RiskConcept,,"R,C",,,,,,,,,,,,,,,,,,,,,,,,,,, +ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,risk:ViolatingObligation,dpv:RiskConcept,,"R,C",,,,"This concept was called ""ViolationContractualObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,risk:ViolatingObligation,dpv:RiskConcept,,"R,C",,,,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,risk:ViolatingObligation,dpv:RiskConcept,,"R,C",,,,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,risk:ViolatingObligation,dpv:RiskConcept,,"R,C",,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,risk:ViolatingObligation,dpv:RiskConcept,,"R,C",,,,"This concept was called ""ViolationCodeConduct"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,risk:ViolatingObligation,dpv:RiskConcept,,"R,C",,,,"This concept was called ""ViolationEthicalCode"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,risk:ViolatingObligation,dpv:RiskConcept,,"R,C",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Detriment,Detriment,Something that acts as or causes Detriment,risk:LegalRisk,dpv:RiskConcept,,"R,C",,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Damage,Damage,Something that acts as or causes Damage,risk:LegalRisk,dpv:RiskConcept,,"R,C,I",,,,,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MaterialDamage,Material Damage,Something that acts as or causes Material Damage,risk:LegalRisk,dpv:RiskConcept,,"R,C,I",,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,risk:LegalRisk,dpv:RiskConcept,,"R,C,I",,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Discrimination,Discrimination,Something that acts as or causes Discrimination,risk:SocietalRisk,dpv:RiskConcept,,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""HarmfulSpeech"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,risk:SocietalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,risk:SocietalRisk,dpv:RiskConcept,,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SocietalHealthSafety,Societal Health & Safety ,,risk:SocietalRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Terrorism,Terrorism,Something that acts as or causes Terrorism,risk:SocietalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,"risk:SocietalRisk,dpv:Impact",dpv:RiskConcept,,,,,"This concept was called ""ImpactToRights"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""LimitationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Harm,Harm,Something that acts as or causes Harm to humans,risk:IndividualRisk,dpv:RiskConcept,,,,,This concept refers to the general abstract notion of harm,,2022-08-13,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, -PhysicalHarm,Physical Harm,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Injury,Injury,Something that acts as or causes Injury,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,risk:IndividualRisk,dpv:RiskConcept,,,,,"This concept was called ""ChildViolence"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IndividualHealthSafety,Individual Health & Safety,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Privacy,Privacy,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Benefit,Benefit,Something that acts as or causes benefits,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Fee,Fee,Something that acts as or provides fees e.g. for using a service,risk:FinancialImpact,dpv:RiskConcept,,,,,,DGA 2.10,2024-04-14,2024-08-16,modified,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,risk:FinancialImpact,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,risk:ReputationalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,risk:ReputationalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,risk:ReputationalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,risk:ReputationalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,risk:ReputationalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,risk:ReputationalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,risk:ReputationalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Discrimination,Discrimination,Something that acts as or causes Discrimination,risk:SocietalRisk,dpv:RiskConcept,,"R,C,I",,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,risk:SocietalRisk,dpv:RiskConcept,,"R,C,I",,,,"This concept was called ""HarmfulSpeech"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,risk:SocietalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,risk:SocietalRisk,dpv:RiskConcept,,"R,C,I",,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SocietalHealthSafety,Societal Health & Safety ,,risk:SocietalRisk,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Terrorism,Terrorism,Something that acts as or causes Terrorism,risk:SocietalRisk,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,risk:SocietalRisk,dpv:RiskConcept,,"R,C,I",,,,"This concept was called ""ImpactToRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsViolation,Violation of Rights,The infringement or breach of rights in a manner that constitues a 'violation' of those rights,risk:RightsImpact,dpv:RiskConcept,,"R,C,I",,,,"This concept was called ""ViolationOfRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsExercisePrevention,Prevent Exercising of Rights,Actions or measures that prevent an individual or group from exercising their legal rights.,risk:RightsImpact,dpv:RiskConcept,,"R,C,I",,,,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsLimitation,Limitation of Rights,A limitation or restrictions on the scope or exercise of rights,risk:RightsImpact,dpv:RiskConcept,,"R,C,I",,,,"This concept was called ""LimitationOfRights"" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsDenial,Denial of Rights,The refusal or withholding or denial of the existence or applicability of rights,risk:RightsImpact,dpv:RiskConcept,,"R,C,I",,,,"The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,,accepted,,,,,,,,,,,,,,,,,,, +RightsUnfulfilled,Unfulfilment of Rights,Failure to meet or complete the fulfilment of rights,risk:RightsImpact,dpv:RiskConcept,,"R,C,I",,,,"Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,,accepted,,,,,,,,,,,,,,,,,,, +RightObstructed,Obstruction of Rights,Interference with or blocking of the exercise of rights,risk:RightsImpact,dpv:RiskConcept,,"R,C,I",,,,"In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,,accepted,,,,,,,,,,,,,,,,,,, +RightEroded,Erosion of Rights,The gradual weakening or reduction of the scope and protection of rights,risk:RightsImpact,dpv:RiskConcept,,"R,C,I",,,,"Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Harm,Harm,Something that acts as or causes Harm to humans,risk:IndividualRisk,dpv:RiskConcept,,"R,C,I",,,,This concept refers to the general abstract notion of harm,,2022-08-13,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +PhysicalHarm,Physical Harm,,risk:Harm,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Injury,Injury,Something that acts as or causes Injury,risk:Harm,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,risk:Harm,dpv:RiskConcept,,"R,C,I",,,,"This concept was called ""ChildViolence"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,risk:Harm,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,risk:Harm,dpv:RiskConcept,,"R,C,I",,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,risk:Harm,dpv:RiskConcept,,"R,C,I",,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IndividualHealthSafety,Individual Health & Safety,,risk:IndividualRisk,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Privacy,Privacy,,risk:IndividualRisk,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Harassment,Harassment,,risk:Harm,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +SexualHarassment,Sexual Harassment,,risk:Harm,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Benefit,Benefit,Something that acts as or causes benefits,risk:Compensation,dpv:RiskConcept,,"R,C,I",,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,risk:Renumeration,dpv:RiskConcept,,"R,C,I",,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,risk:Renumeration,dpv:RiskConcept,,"R,C,I",,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,risk:Renumeration,dpv:RiskConcept,,"R,C,I",,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Fee,Fee,Something that acts as or provides fees e.g. for using a service,risk:FinancialImpact,dpv:RiskConcept,,"R,C,I",,,,,DGA 2.10,2024-04-14,2024-08-16,deprecated,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,risk:FinancialImpact,dpv:RiskConcept,,"R,C,I",,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,risk:FinancialImpact,dpv:RiskConcept,,"R,C,I",,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,risk:FinancialLoss,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,risk:FinancialLoss,dpv:RiskConcept,,"R,C,I",,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,risk:Bias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",risk:CognitiveBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,risk:CognitiveBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",risk:CognitiveBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,risk:CognitiveBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",risk:CognitiveBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,risk:CognitiveBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,risk:CognitiveBias,risk:RiskConcept,,"S,R,C",,,,Rule based system design also potentially introduces various forms of human cognitive bias,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,risk:CognitiveBias,risk:RiskConcept,,"S,R,C",,,,Requirements bias also represents occasions for the human cognitive biases to manifest,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,risk:Bias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",risk:DataBias,risk:RiskConcept,,"S,R,C",,,,,ISO 20501:2019,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,risk:StatisticalBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,risk:SelectionBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,risk:SelectionBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,risk:SelectionBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,risk:StatisticalBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",risk:StatisticalBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",risk:DataBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,risk:DataBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,risk:DataBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,risk:EngineeringDecisionBias,risk:RiskConcept,,"S,R,C",,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,"Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +Discrimination,Discrimination,"Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate",,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +DirectDiscrimination,Direct Discrimination,"Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +IndirectDiscrimination,Indirect Discrimination,"Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +AgeDiscrimination,Age Discrimination,"Discrimination based on a person's age, often impacting older or younger individuals",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +CasteDiscrimination,Caste Discrimination,"Discrimination based on a person's caste, a form of social stratification found in some cultures",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +DisabilityDiscrimination,Disability Discrimination,Discrimination against individuals based on physical or mental disabilities,risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +ExcellenceDiscrimination,Excellence Discrimination,"Favoritism towards individuals deemed more competent or superior, often at the expense of others",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +LanguageDiscrimination,Language Discrimination,"Discrimination based on a person's language, often linked to national origin or ethnicity",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +NationalityDiscrimination,Nationality Discrimination,Discrimination based on a person's nationality or citizenship,risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +Racism,Racism,Prejudice or discrimination against people based on their race,risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +RacialDiscrimination,Racial Discrimination,Discrimination against individuals because of their racial background or skin color,risk:Racism,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +EthnicDiscrimination,Ethnic Discrimination,Discrimination against individuals based on their ethnicity or cultural heritage,risk:Racism,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +GeographicDiscrimination,Geographic Discrimination,Discrimination based on a person's geographical origin or residence,risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +ReligiousDiscrimination,Religious Discrimination,Discrimination based on a person's religious beliefs or practices,risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +Sexism,Sexism,"Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +SexDiscrimination,Sex Discrimination,Discrimination based on a person's biological sex,risk:Sexism,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +GenderDiscrimination,Gender Discrimination,Discrimination based on a person's gender identity or gender expression,risk:Sexism,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +Homophobia,Homophobia,Hostility or prejudice against individuals who are or are perceived to be homosexual,risk:SexualOrientationDiscrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +Misogyny,Misogyny,"Dislike, contempt, or prejudice against women",risk:Sexism,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +Misandry,Misandry,"Dislike, contempt, or prejudice against men",risk:Sexism,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +Transphobia,Transphobia,Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms,risk:Sexism,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +SexualOrientationDiscrimination,SexualOrientation Discrimination,"Discrimination based on a person's sexual orientation, typically against those who are not heterosexual",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +ReverseDiscrimination,Reverse Discrimination,"Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality",risk:Discrimination,risk:RiskConcept,,"R,C,I",,,,,,2024-09-30,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, - -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, diff --git a/code/vocab_csv/dpv-Risk.csv b/code/vocab_csv/dpv-Risk.csv index 560168670..ef19bdddd 100644 --- a/code/vocab_csv/dpv-Risk.csv +++ b/code/vocab_csv/dpv-Risk.csv @@ -1,5 +1,5 @@ Term,Label,Definition,ParentTerm,ParentType,Value,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution -RiskConcept,Risk Concept,"Concepts associated with Risk, Risk Source, Consequences, and Impacts",dpv:Concept,a,,,,"RiskConcept is a generic concept that allows creation of taxonomies that can be used as risks, risk sources, consequences, and impacts",,2024-08-16,,accepted,"Delaram Golpayegani, Rob Brennan, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +RiskConcept,Risk Concept,"Parent concept for combining concepts associated with risk assessment such as actual and potential Risk, Risk Source, Consequences, and Impacts",dpv:Concept,a,,,,"RiskConcept is a generic concept used for creation of specific taxonomies in the RISK extension to provide guidance on how a concept can potentially be a risk, risk source, consequence, and impact. It is not intended to be used directly and is only created for organisation of concepts in DPV vocabularies",,2024-08-16,,accepted,"Delaram Golpayegani, Rob Brennan, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, Risk,Risk,"A risk or possibility or uncertainty of negative effects, impacts, or consequences",dpv:RiskConcept,sc,,,,"Risks can be associated with one or more different concepts such as purpose, processing, personal data, technical or organisational measure",,2020-11-18,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2020/11/18-dpvcg-minutes.html,,,,,,,,,,,,,,,,, RiskMitigationMeasure,Risk Mitigation Measure,"Measures intended to mitigate, minimise, or prevent risk.",dpv:TechnicalOrganisationalMeasure,sc,,,,,,2020-11-04,,accepted,"Georg P. Krog, Harshvardhan J. Pandit, Paul Ryan",https://www.w3.org/community/dpvcg/wiki/Workshop20201104,,,,,,,,,,,,, ResidualRisk,Residual Risk,Risk remaining after treatment or mitigation,dpv:Risk,sc,,,,,,2024-06-16,,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,, diff --git a/code/vocab_csv/risk.xlsx b/code/vocab_csv/risk.xlsx index 7492c641fae6d93d518445b60ee162f896d02bd6..9644be44c27797ad2f9d615024cc370875e34d78 100644 GIT binary patch literal 474090 zcmeEv2Ut_tx^@r+%K$neD0M6-DiD?4K?PIx%Zj>+;h*b&tr_)-`d~$-nCZN-n{RA zxnjz{RTQv&`*uJ)M9&uRt3Ug>@1fp6m%tmLp1$rue|>XW3F_mW)dBK-cj_C##l3UF zRzse4`}dv`1$UUA5+0HBm3)}|Q5Z1@@4Teu8O|r;)1tq=(CQmpv3CCE-iX7qCEsp? z?JJ{!4ht{%l|Gi&xJ_`1#Tz?3X!K>49Z)T5$K)NNhJ*7;_C(%qu)Acft2J`wo9XT{ zq4DotrD(m`(RLAH-BvJbv}CaTS@`?PoTFp2_59EH$#k|E;ZB9>&Q-%KsSS;Tcf@XP zY+H33DSRV{wA8(_$=4KhTlwCWc(o@dDk;bNFPvrR?9gCKFi0Q1ul?BL_<_G`SpJ1zka{-Tl4bk4bPv4<<~o&KM%{Vw>*Cy zmS69A{_9x&(kR~#GYy=FJ5>C zFsR;9;z^IFb~b&`SbRSJ;>RabGx36e@)I^n+m%o6;h1IEVGFK&;Ex9K9U0o3S_S4f zvQA@baJAU5nn|!0wcbsO}6rXNpWEr4_{EqlQ=&a1O&4 z#u#1C1?CWZoDUa8RaMv8hHExhgcf9ySIBtEYIiGfb-4DjpA6VMP@NUQScI;x<{)uH z?d>ZQ+FA203}y|HNlX?&4G+VgX3fxc4xub?xEwvlD>I;uwABKK&a{G>VO%7ONIs6! z12^iU^d0p#84;j_?oAqmN+h*flm>131RSuyZ!SZb`YhT69kW)ms{o{~I_VVIQM0k2 z#9n9{SL@9xFyDu)RJ6tw7OW;HN7_#Snchp zF#2M8B&LRinrZFs8MM&17}gi+=|5c>REh73BAMyeZmu)d&nKgo0>#4mI>h32S?l|J zIWrqi2Em~tueJOGQYi^X-{GdrR_XM$sJYv#!}GGq1KG7@YvjhLbU0>XW&K73bA4{3 zp&<|d349FqLBx;aAc`kw>XAM(iS4WH9BpmlW?i|BBhnAd4rj2|aZ$CK`f5ZmSo9te{jEjl z@JC9eF?AJcZ=u?dw}Web*PyS9;f+U!?=9GP z2N+G;Y<}AJ){z#9yuiBWgZ#j{x5MTUys^#HDEgiu?q=Faho09Qk4M*vstNLMo-xvl zFZLjDORNA;15!WfQKSFc#`NMT=R-1ART z8?6mOe;8{F!(@Q8UdJ|QY2?R}wKU$uc57)A#L~4YU&pp+?H4|N!1By1m(&!+OaAi9 zO%;y!eJq@b`Nx%)=-C8SvaOK0Zh=g(n(nHXYGQ?iT#w2|KLJrATtRUP{e)m8mf^;;ei3dpe2BJ%yOT+TMPja7(|;ZOP^2AO<`OxugAi!}s~vl5e~h{e^WVq>RY<6+SRYQbx>Rxe>6Mam&Ayo;@6!ZFc83*q8HN{` zBJsBhUcoQCQeL1pi)X-R z`Bquwsb=Vtaifx_v-ljvOGit83coUJwhT})t@dKawb4%=#cDqk4?Wbru(h%Pe&WOC zwJU`C^v$HRW~xnU^khd7)l0L@k39n|OU#;&5X`F2sn%4fSDjUOdenwZ+m)-ckSO5_2QBUsLU)@tV81aUNrC;L@DhSY3 zf$kCl^8ondi_PfQzE*0#5v#rp&M+6GmMc}s6co83vmK%o6W`h;PDNHT_%8_`*L*Ra zp0f9n`EgCecxKA3OG?KN2y060Q?(XMc&p{1a+C4#rpm}$2}*oFUvkfN{ZGQy`wJ2& z&);h0zP;3}CYQ>WXqDeDy$SsV<)@UlTGwwBb`{B93B1s}M-Kle^Ge{Q<^yt5j~uQ9 zUTpUN(CLxeluw*~az`D!u{$lonekcqnfPeFU!l!KHzO9!4wzcznfWz@r6Y_vGbrg6P85d+Y`nL}UpVwPd!Y6-JxTj{&%2qtfP4-KdBCkbn6jZLQ` z_9mHYYLTZi5xbIR-^6TFje$vzE{r+s+}$K%mMnVi zxEs8$M4a9lZW4qJc^C_uAK2Nh9bqA?p*24J1Hw7UTtjPO`aU8kNlBx6+(X0L1p)4r zrI56+;kHf7Yo8xZ7d6{j+J3L%o88>g&=(|ov>=`~cUj~9ac-V>ox&zHbg%1L9y7(* z$(Kyn{R)Za;QN{T;u2T(Q$wxLnR5~p^c#4C|Kk?{r9a37*cn;bP^%XkDh9o>e~>_0 zzE7=rd;g>)(w-QcXoY@6xtp*F1&b$UxaSXF@)5IaXv`nA0|ttzlD_lK$`}ZIY}I6I z=}#5cWL3;rlO1k37?>%fRVpg$f>qicdAX=26#6dqs#?b8?UTqPaGp)Q67UlZh|S{| z#)h7ZN51{xF@=#9W{Ik&Y)hYfI=e63ZI3Dx@q=W9wM&bHPEahm%}l8FOHd9$U6TL5*m=AfnifnPLNu&A zOEbq37*@Uk;5$gKIFkZpxe%$8!9?8 zE-eyvuR`;ge_2E4ypEmL_?M~B{lHI@_8>2HAt<=6^Pq`|lyp$=yUyb#?owGn!S$VT zCJi?ZORAOx9430Z*kcRz$49#{z58R!&)6K7XitEht7Y#tqhD4Tmo#`LkFI1O+1vnHFzm9>362Hv6`<-Mxu8?8snHDI@2RNem)m$ z?(ouMP$54}aMH+g=E!x|)&Tg?%&nr_bv&c=JY%aUwGHv|9Naqf#s^f%WZ#LggBFCc z_Rz^_#JQv-4Xw%PJBX`EZ5mor)3*_(Np~BJ)o!_vjVt;;RKRSbK7_WE7|Vu8w;qPB zCKRY?4vcZv2~trEL=Yz>Sg}r0dku@;DrtNduhMHM$dGJnRqpZAK;K&nKUQ>TV{%7S zS1Q6M>1ZpZ5PV~PF`&k}sBO|k2eiI7w*dR|zfr44*nUSP<`56wZ1{C1DH!}gq{ zXln1g4PpSSm1yY->8uPp3ZwPNk3A=yc=0?7>T$KKwezR2tXP;wcR3KhB^1h8~uN1_qM^*L(>SFjs{ItALA>le0n=nGX z#Ddo1;-rOWQ1FM&JtlamEdSt-od-;&q(J_`&7J;zAB?$E15>lgU-(vysy3@$Icdcj z1>qW03wFM=vBEX>)HZHV7p(V1jx?<`Wbo#>r{g)+grS~)D15{_!h`^GeU~%qJtQeH zTy#ic_&=E_;9gEI<>s5HarXp7;tSt^&+THfu;GfK*Tei7HjMZP#&+#&8%8Y$6eR=? z0{2MzGSo-W16Jja+^sYwd4-fIq(jf9u^X6M6;R}vF<%qs4#m_)C}#+XX(zrx+J z@1$g{7cnYkU#~j!WmzfKPGt#h(gd|u!3Z;`DE9(qcRR9k75SDeb%ezJ?TuSQBB-pn zQ_KV#(48Yjs?J+YeCrUUaLf90ju_+aesb@d+0(@{VJ7@G3vO>!aah^QyN1@I(Rw3T zky#gaxEI#b(r>z$Qa}}X*8M{7OKv-rTOM|6k6&%`gVt%wEItv$O!4`_>S|;bD+DnM ze0~vi+OjGYdLDC;9eta*Z<&V9%-ANj;4S{G!$pZ39s66JXNx^oRh(Uo$;ite7R=tq z$TLFb8D00ZyHgIc`^??d_g;d?_h-o^9ADJf0p0oOmQ#F&G5?~}2-Cv;;HL$6RCbrt zYalZ^<=mwtdCgbjcT%oiYLnN@8^4`mdg<=DBx9*W&4F=`1jNvHGwm_HJtSPAV-s8W z>hj=j$<*8-MHiidS+m=)ng^}6og&$iW0z9DL-wTRn*Zg>ZC+ufqTbV6@C>T{Vx3T3 zYV?A>#qAFkTgwh^2QmHt(5Jg{_(@9`i^KqX99`w)J*-gYteJOHY5veOvL>|D>U}%E z=gZ>{dS{PcIYxYRS-$_dOXw4YoGm}*0nl<5e6<{%ZQtsPEQ-EHZTx`}_s>|w_#PNW zTbEH*WXcO>MV_DwW-XqC4^1FW?^wE&8cm@6yhgh=GU6gekP9d>IxPk&jpMFSZEIWn z)bD?VhgIELr~zJF>w+5O5mXWn4RpF$f0le%_R_5M2XNP;$9I=DUsOMI;1%N5oEyql zE7Md|P$&ZlbvJ5}Ww@^%nW@JSJRD@EBMdiHu2_djyp|mQ166g*T4c^sm4;#DydgpN z&&U^fF>d>Gg}$+VsvY}yQW!^S>{K&JU3uKqZBUxeUVe=l;`7o|UetCfN~Pbiosd4I z_q%)S!?cCyxcL^P=d{LMHh#s*w`@9_(ppapYy>*T@#&r1s0WCYNj4Av6}TO@MFz8E z`x4#2-;6b^*rD-~&d8Gf9skMpn#M4pj};AArbjN}EL}hkn-2}|3$qoie(_yG^|qI% zn3IrIT6?F$J(5X0p8h)g_P{tlx^mVXxuI?HWiuT02!$trY&K&HRwgac;;lfeDHUyo z?%4e;+H9=idA?av#iZa(;+38+{rve-&Hg?205Dc$F}Au>v}4 zr_(HE0ZKU5Kla9pcEnyML^0bXA@57@U^(=OVs?#Kdr4yuVa&DyI&Y`bBGwK{aPJ?h z@}eo&>x3$1yCzH_8%w=uzX~=bj2TrxXY4Q^#DJg#@&2)wUbI8@m|#V)OF|m5F~OVG zRStcq2(A_bmNfn}9k<(3PY1B%l3{njxW*G9O)9Y7zmiB~+5}oiqI#zK0E; zdPkujKEJ#YO_aZKlv(HVP44B@+p%E(YH_LM+uhiaT=C5LZGza5V4%kIw!H9qL!bs} zmoTh;2JGLl%ly}&P93{mh1chbbK4sN)91Ivf=`il31FS7#lL~o2Ltyn-<|=Vn%>rp z{UvZqgz>_`X@I=u}QUVjb7j0h`s_HieWI^V@QZx+_AW?ejt?(P(pKFQ0#w7?OWX%f~_RLx^3Ka5|+dNZNql zIir<}?CuST2IZAgqHD~<34G8jF%Zhu+(#)3m#!mtu50C@x>rJ?9rGBJ zXq-8dz!#k*R?NRe+s8?8JH)PDc>i2kth7O&=ML@M;%+fW^o=~#x#$M-@IJmDvc%r< zf2-|tQ&1ja*C>2_t}H>iuFvy;cJAA5HAu8`UdUWD-kjOT_aIBGg#VDXkBi_1h+VUA z`dnG6v_Ze;aqZlaZfi)iYhL+Wbc=a-KVN#5SSkM*Z67y54~Si>aNk^6hIC!Or>1sp zX*WczxYScyvai1^OK8q}piKax=Ht$%Xq8uq^)5L}G*=yZ{P zT^pF#ADe}(C>7KW_i-12tPHft%*~Z&>Gt(|X@?h=5+Ey1?kMV9{Xa2qzO~#XNa=qj z_y1to|K!wD0EqBF8{eE%Sr&hvriZp*aZm?D*l8-4Dpl8JNYsqZimeC&XbbxMFABt! z)sEX!*2)=j!}fR}63Cp?f`@=sxBODy+G97Lspw&+-v8~T{z>DuRold8YC9xppl#2b zRC(6nKFwR&CdEOYAxTbCuc=b?ZI(pM+gXT;pnuoE)s-$tQsrYp3Krw9jFPJf8-;*P zSLpAAuurJdarUqoaGe?U$=qxl5vJHr*rmQ=S5hkOOMUt8g-vE%+eM;gOjc?|&=&1u zK2uvE<^ydz<}%B&_V#IdY9A{O>VlX%P5ngu8u%A@OjjD465poH-A}Z42KGxzs^h^W z+G@VZSeGd8!SBMGh5IXwR!VeB0#dz6yDH6AQX)$N5OZ?cu4L=}e`RO|wB3ECzJat2 zv>lksEYDKz)AZ7IFAnO3v^h-`QZwt@Y>Aq&S)~<0UjzT!@LH3Q8@EzA|yTaRyczH!BA#p!Fm4Cjl2at~OHT3C4g zvxbCETij=A3q)z4ZQGnfS=O$;Di3Y(;-F55lGD@+szY6y5wR*dE1@FjYv4Zm;ir^x%Yhh~?$})9enMtUbVX?@TUMRf?j>h^Tgi3pc8v+dv zfw;;I2zBO!zFsz!I8_kJsc`q>upEbdW!dCe7ITIWKNFu8g|*GG!PrJ=u6N586|CcG zF2sv_wkB-CLYa&eHfPF60{oL7c${frqmERS%^*{U%=C0B z+UY&)*&G2=MBU^zL(#P`L$Pf)z*o*2W{Q7v-td{Y&OIdPq4>U|CqBM7OX{xYzVsZs z(st>^30swEMDzLP7Zeh$!$)lRG#&XGMo%u?q)O(rw( zjBold0FW~Kdry;b19%VS{Yow580hN#Yt4`n@BgIq_Dgf8M4NI(YR@&d8HJ}@b2olV zHr^)g`@RK)SLwd%nfln?*Jz`|5Js~<%7 zyPgdInf6?pUZA?x8a$<6?kViPbj{&z<3q)w$Y9&ZnQWYl&Xn0+p%2sI6j}!`}!19XdB^!=Hu~Q2-&d zkvOZubBm|-4qjY5KJx7)odY>tEOHQOH8us#-@bh6WBHw^0VJrv?7HO9t+MmeXP@mh z3OZ=`Lv2Icna8{6#X0luZd~3RC^@~{XS4PKs<|5VK-6%hyXI-GinE)R;r`mg-4`#{ z8Ek*h7`zuAC)hl&lTRyS&hRs`#Qs2c;29Pz`PDHK{f!^br??&yX6x)@Z@F;ChS@Je zi%Ut`ce8jvhg$bdXx2D!-T(7=M38vx=vG;8kD~RJ*w)^8C$ya0$#{*P%)$dk&E0xr zQBGu%0vx1z#LL1m|3(h{G9o^dlky~)H!Xx^PpdX@A2Lk+_V=d6Z-~ggXl~0%)bFKC zN(4quYOEUUKBfja+cElEv|pPzx#+EF%XC!_BBEhrr&0Bssd89k3_jP>z`Mg|IKBeH_yAPbR$ zX6;D*OprMe547P(4HvQLJsiy1nJN}_z8k6odaCFjxf;mm4u;Vqe5muA-D|UR^Zny) z5xPvE>@l>Bdv`x>h+Pc{4bs+QE-t<(XeqC(MS9t|ixUcxPwL=UPgIY}>Vq?rhcCD3 zJ0_y?k`o4#fbFkJNjPS3KoI&mb+*8Mes*jV5~#ke5ed<&dWKRV#?s4a1Ujuj`0-2W zYAwza-D<5G7M0!_S}Nz~7EVJYv?R>rh%gytpJahH`om!T92AYz?K_B@T=!i=|jYMFcx}!i9{_B zPi^mRNubbbh>vU9ZAvFORi|q+Bf_e*BnQKa!)cVfnaJXm*~Woxij1BHW`9&wY_iQf ze$6qp*>9CovOdZ-LV*V}LCH3?^Q2EnfN?0G|18djlmikOa$VmRuNiJtr3Z*PO?~#O&YBsBR||O4B?Cld2`?#feHfFAF=u_&kU(szFi+&HqVS-&yl`OZx1cCVQIkU*1V_m z@9Sqr)@IgbJIH_{(&5isX-{9}MT9O*ywT7vjljL3H&2inIPEs}82^xo*|7~;j(aI^ zvOgOhwh8RaRs{FKFFwN^(Z#->ExjhAhr$=>Mu_>fy>jQ4YF=A7sE1jBqi#MeqUsg( zSIm1EuL{mi%K+-*WT-e+*a{BEo>*;9ozd4D+@x*N5V!?j_9B_>XhK`i z$8wJ+k#0f!=DE15;=enq;SL(kVoJ#Bi$$P+1MY2Lbu*b5a?sqk9BVU}G7wV?}>s!L^zRi*xr@XD!_$TX?S@eVl? zB~3{4kEZ6JGZO0_{D_yRnB`^F2X=@K=FUN=Ldi>DC^d3NZML{#z?gnN9T1_q{VE*PH0?EJE6jzO`{Ub8~wh7(XPZ z{*IeBr#IVl1r#`vaxP7(YP?VGn385lv&T3h@xAf&Y~$;^teus#>n<%u*qrOAjFXHc ze1@@Ql-97C_$=ph&O%q0g&4JHId(ajoIF;$tHy;pP9-|;s$~YZ*N9V9^n}#kCAPmy zTy!?G-Jp43TX8`dQ41-cw7DvmVL3r1&EV#Trb(c{v6QQ6_l@-icB?h4d)}ox$3KDd zmw^k^pBZ5ndQh?nFBJAMYHe_y`xsICJU?GpD41o2neE?H(ix`qB^H~i+3&Jlh{yLj zTfQb;Yj;#zPOP#yld%bJHYY2GIJ2*(`rl#Vwz1D}$^>v%+r37#%S|Dml7EDF)w$CH zbsnA{8J-`@Lmq`o52TALMwLzr4SD&Pg)I=*GkPaCt`5DP;cU<&gV5o-Sh=jE&1v44 zSGk1OzAalb2C**iDqra^D~300Z70+_E^l0qoT^|C$<-+J2Q}B43OfW&ryNd`su_PT zm#1_fF{13b_id`@?IP8kSS8=<&bLh$zN_^ux(36~nIT^5XZdC9VjQis?Y5s54B9*Q zb1ovAzV)wZA{(|6)h`zlH^S5As$JUUm`a-d&CgAf90KQ3_NHZ4yQnO6-hI16$zrbq zZ#-E}h_a)VtK_wipqF6Ou*$s+oDs%H>2t=2bt2OYQMm)s{K~Y#p#=2gSf!|b{k)NO zqHgfs!CB*lyk4O1M5t2O?+l>4H<-fJyY%`mhuGND2MC~`m$mZ}M&_ZdaT`&&9{Z|d zihP|wB{M0CY2Jj17}Z2yCsG1LB79n)f?@l4s0(+Eql;ci>d;27^Oi;PZ_Lh*ZW@K5 zQ%8F3Bj=dDmgOo<>c2d&1!+z zY0n<5Ce^Yp0P_Xh2NvFi%ThNy+D({xT8o{}lanHX=MZ~kvo<_bZn;RB_Af;@Tts)w z<}VBClnLmp3Sz3BtO#PPCIm25j~Ki+f;ww_p`EXiDD%|&okXr$h*#tfq7G4Co{g%r*Ip3R+4zrXRP?3QM_SK~3h2OFqH93V1q4Wzy6!P- zBB-ae-1#s$DKdBraaA_aIMLhrxV_Bc{CTGfMHgptb~s!s0$MRFwp9>jb9Q;##If(F z=MVPRSz9{SrONt?`)qi$m=F^bg@r4_`^|ZE3~hLCM(6n*@JH`jh%BQZbY-c`={l2m zJ*}nAx5?%a!Lx|Y*AIOZT)ExPI{HnQ1e)!b^Q9OLJt(}0J)C22#kP4g`8`WNN+oTH zUkP3ZDw{zl%K88+G-Ma0?D*%w72TV`gVE@F8^?rLV+#?>LnbwP1N6??WZ{V5X~bb! zY3B5MlRQ0%M2Y^U?<;g#Njn-kG@Qi<%%~s1*A&fyra8x}tE@TS7pWJW&~Ghz(Wn2s zYsiVS&{?15ve9Xhp*OJ9xpFfh!PDG|rNSGe&@yh=A@x>YTBsiE_p!^KoPX~G)nObm zC3rG`OT=^=SNr@~j%_v8nzPXLbH3>{jp3p*I;|F7A>DH?%w&DmJ;L`)JokhEi93b^ zpB3AVzv@?Hx0(DW0CG`C@jtASefMG0hcx8tju!*_tgJ*m$iQt>O}~6DNR6Sw1bT2i}xGJF5+@ zP7)uWb%kI$lDPH7K`_D6z%uen3iP=&5QN`F{dH(flFa~ZAOzEu#O>i@2nHgJDkGOu zpf9CSApA)xl&S^x#Cs8Fm$bpZgvK+F6RWb_B>>kl$_?GK2dLrKEv^`A%l2;j=&{fM zyL)DURgAo1%#`irJ5O;qPce8A;`<`Rpi@hKCtuRp5tD;;mfJVww`%N+k&OeG99%@~ z9+BS)7u_NiSC@P?8nJuL(%^}3rRWW<@2>uI9PJ6n6hL+Zbc6=;_@X5$uki0y^+yO8 z+#0zgRQI_qO9GG|W2y?U;z!>C6bc}F01iTf1$=c9mDl+nsQQ-*7| zF)gY95I@=rfDu3v01-liC_aE>r4#>dHU9B2a*I-#I&dZeE88mfI$Hy5r7dIMDs;UR{Hbr zR`(|h82FBS6sjAn%aR0C$C#=ELio|XfH?sq2{0%$Si@H*SqbHTpzco>Fz_3h6{;Jm zBS`{kV_MV!k^E>sz@`9l7_ccch~ooDRYvpg*6`;SH1HqUDO@*FCoKhd7h|dch~r25 z1HKVNjykR7g~LSw?_&})06+4p2LMC`kz)V_;lV~eC#lN&{2dzpl7e*sBU-|BH zz=xP!nt+G=>VfjmopG|;oB~J8g#iL#R4WPg;;g^ox8v&W@1S`zZY1l#CiKXO0DLi5x9t}CZUFGAp=b$_&zzjQ?u(-$MV?U(NV za^yd$QyComE}6@`{Y~+Ir1d><&LRTvoA~|aDG;MZ*Ei*(|G*IZhf`c%ys7cu!ln>v zIaX)&Bh>Z~PHE3vW+jg-3E+_>V?46tJ&!E;k;kg+Me|q{UmmM6$YWLh5||gA7Qe); z^lv`=BdxE#ZwX$v1pI?j{!MGo5iL*571+onPs}ygh@B_qI&AuuC&uBK>^6)OY~-FN z#sxO=%oF1Q8_D;?c*91jJu&{Uk&m93;Aj81+o>b26duICQPAIH|C`Dm(Ww0Yt%m;r zvfs||FA=zHPGPWZ3q;Jc~j%Zug_KvFH01Vx`Fva>FzV6$!Pohh2XFVqV{~RVbpOC2DBvYxZ zHY5=~GSmkRnv1D%CR5)E&L=0Te~_s>r#5sbd|IX-n(7S~T~zDmUu|xZbQKvqF6sBU z^11%$u-={rF)Asx@1 zvZ|_!g~ucMKG$`>S`4_#-=6VK&|F9-V5h96>f)#45!0VLuI4Siy}Bts5}PNGtrM4= zJ@)^840wF_Ade5P?;F>DC=RuMrK;q)+S@7)XDsrg4rYYll^6&ca`TiZYNd`g2Ho4IaTXTsgI z|2yMY-}abTbvx@MI%u1=jqlV>2y(D(-<(5L*2%uAKy91ipa}@lY3d`@;cMW}@Ca$6 zNRblBc|1a?G{2bl8B4KuFGz1tZ(E;6dT1tFYUr5+;a9fG|ho8O!?tCOV{i5zdjN;A{$K?}l_xmBJ_cpHWxzNZ0me9ZLEnNKE zw%CDGonyxnOM$EWT~_)Er7Nz1Ok#u0WC4etM=Luo0`KgR0RYav|2uNuCBdyWZ{d*5nJNDL&S+s0WKt}Ur2bI&L9|5DI zqZ8uqf@>{(O2pbs5kcoq8~)f4H~PJeCJdw}bX1-e+AI8u52MB8eeaQ&ROLwERjUYt^?hmqLr$=#>u{B`* z6KJe?$7{k08GOvWOEO$zO}2H2k2fs+GG^C}xop4tj^7)W-(dT{xI(p(`U52|_8u8I zmL8hh*))kXy&rTl);NC{@cp-GH!lvRX;*B0>>>B?R!Y8WHoOvWp?%q3l#1J*k)iaF z>EiaC*lx$@3z!WQt~L_1?hFeG4~t~LR5!~is?T6IpsbmtSu~-*B;Jo>Wn<&JpoG)| zMPO^6)q+{!u$m1=eNM7X6nJV%ZU^-FS*$sWJ&YLQa@*l+8;P%Et;s zGS@Q2B5NwwS@_i`QqB@H@+3QQov}2(fQKlW)A5uZS#=wr`_vlY#Q_mK27_a_=+{PO ziF5Xi(Fe@3G-0P_%h{+0>~Qy;Ucj^aGf#m19d&TF;<}tTL8vZH&52tl-hiHct2%7K}AT>0$n;y=w&+#SC2CjaggoNoWj6)|YZL=V0P; zY-C>1a41w%)Ed4wFFuxgF4ows>Lo(`D)V7x(GNJ9Y$#zk>M6X|J_pX)fQ8&FI4Lf> zpu}~Nsf1pa;nddF)Ua3jZsS9OLUST(tJwP81@XOu<~VbGy~|%bW9~4!ID?n<^;v5y z+WA$RFs%d~Z|{T#8Th6!A^!-g@}aHXZKA`YN+NEl;z zH~}ZaVNP{(oDn&HyK_w}OsMhc*~F(I4x@J4%{TTH0KL*~8=2g{9p_70ZJeMF0Wdrla$?nxuJ z$C|TVTArEiAsIL4+DG|3`euWntDoHwGMB)7T9U3*k-m3DW$b{U$~V=4XHLQ*=EGrq zrSHX>fu--on^C1l^voSF)j;IDg&el|%=GAw?Lc9X0^#`jH@fE3fS&A14~y}Y_cz>C zZoPY5#?(}7%UpY{vw!U3EuF6N`U!%&kt?mT!tEl}_*lL3LV2FTz}4*DfSE+5Q_N*I zqY&FpSgA+x1GVgXuu|{h7sD!-1d>_Q7oBvI4c{mC#hQ=G*|)}Pr5g}~XS4E-+{v?j zFi5v(c&vN!cxj4@S3?SEvQf~q#>zQ%FE&pAo({r>{}ldc?jLxkoRQ&qb7UcelH7vi zAqntJF~pGF>xA+vVLk)?4~{+-&+B*Eh9azwy?;^Py==^yD({d#fQ-|MSYD9t|H-95 zIOk-=8@D_*{XL4KL!&4k)dMkgYq5LuKC8zeYrg~Rd_&J*IB8{ za^d*8L9>h;^O4lwxs=?;OPLwpQo387B;r-nuMyFD3N>r-qMj1N2(yaP6NVr6`;?F2 z4EVkN(Yo~R-azX+$|(rmv!G_t7n`lL=^p)M;|-9hV~$#<*DF`0B1b%u5&y_Pp^0p) zHsi_)+xbZ-amVO+($ux0_5#@9@f#Wz?k6f<(#t{&pXHS*8>Q!o`UI9WcCIMQwstSx z50fwuDGigzR<@W4T&RK1Odc-}`uzmexvNJ`74V;^j&g{fJQeG`F!5aE^nuLw`K3AO zm~##2Nj;r#Z=DwAqLB&Hp}|JF=mc1|=xXQekDCe>okvaVrF_sty~?pR%t!ZKv+VLy zKzXfoU;21i?(`oh?+uaq_Rf2Yt2c^-^X3clSMrS;-Vim?!VZ{|nktesTS?aYxckkv zfcfvgJS9)0x^;2|U~8@h$A*2fGbiU?FsrLfJLAK4`Ew)MJNZoFrKAIbKXvXf$&<U5U#e)G@0RUR+CmmCWCIfE4S z6R`ukxfWLdAtpat`7~4a`-9Y*qs6lAqwb9F&$dI^%!EdH;nlkq*lzn+^M2IGC5*RK zC+4TD;ZUi+j8gs^f&y$ymeoYwv5xD;F*yd};qOUzH;qU%OVW;sd$^)1CRsPN2|wU>QfzW3u*Oo-C6G0aTM&%+Z`rtHVB z$N0XC2>-nNxh1@&RQ`oPSZLaBX4ny!rygvNeO``|nAv9FRjS^JG@>~C2vM}N+8kqO zGO;o05kEh{?~??X^od4?PVF)O zYV6Cn+(5k>W~DAeq4LKs+_m*$K5@HIdP`$hmC%C57lQ!a=`Cm74%$%F>@SseK(D5? zGhz_BNh_LKe`kv!kt}KJJbRxY*>8L}yt`#XxstfMqT|^Q4d~8Es{?NSTy(syd(9u| z{s!K*vaoquBlb8iha|4GvrXsS0iA>qhG*$Zo!GFNG}Ky5M)hykpi;sxuIT(Qv|Pge z<}R+Qq!$>xp{zJ?1?(rQG1zp=n)Z#aRp&QqFuA(F;_tld?uPU4@#UTWKbudyMQ_`O zr8y<)6G~ME9aUlE8`#K^MbePlzV>(A<#2Y&_QEeG#>f5T#Jm2`i7TP8w{8Y#;2;X` zpv%dWA?f0NwYjn49~FmoOuL;hk~C)a`f0$tFp=#)r)Yn%GwQxZ@|jPS{p6W^_yh#I zV8lYssO3;S{fbvsW|tPF>5!g9k@r(p2yoA0@_TnHgzEHXThS-fRLlhb@Lv`c{R7NQ z8sO?~UB2v-vi`J#uP9!5aKcMWD0F?&h$Q(*cCCIc;5XNAqBr)T>e22sv%{43EVi9I zsoQikFYQncxEgfc%XehYnP*m>m3N<6g;n0QvueN{@yWSW`5Nl@koUDa;4X{73{LWg zdcQ?!Fn4uHg;{pqsA;8izQ}L4y|$V5N{ag1iI1uuE+XD9n|vjU?eek~8ouaf{diRJ zQR|6kpW6EqRE849JyH=xkaG?GXXqLj$CfvF_`MZaw~I+V2^A_Paoay8eR`v3g8-!1cQe@oEJg0e7YpgohL-el93pb_e-OHjq>>FI$<$yC5->k;Z!a z!atm;0z{JNt`!CiA|K*KYbjn#aK<#qvn^z z@nc!(LKgI}rJJWu=e*de{?@&ze7NK6cePHoPJ0poV)7?5> zGffkGYRB3(?~$G~0qObkbs#+!DgwDmKRG7)ivKsz9Na%2;EciZHkF51PZ!qdh4z{* zv(b0md5fY?{G^~%bF1}hk1ebw-iQ$^_C^f|Ct#$-#ECajD~~3ewGnl(T;*%>D0vzp7bj6Yfw4aGj30-6}p?bt_aRJ6(lhA7mj z%x%HgxSOx00aMoB&Ac1+@Mk+5B6k}`{SbN1s)oLudGurLMbfz4pwJtyhO3X(SvBc3 zyejgh?i<}`LpWsXXAEeBs;UfqN5A< z9K=GRq8`3bm^B8<*?tzX`dIQ>GVPj+rTX?aA73ExsdKbJ2K0$;c8yGX30Dq8wq1eF z!*p6?+Cja=Pne^1F`y51!PPRr60X?i{|2MD;_H5{ZijXv90Sn>yCxHm_<}jw00a717hEHQ zD&cB)$W|**Dh%^c=2yWHpBZZxR@PoqXbg@GYmQ1hIN0;{a^6joA3k`O+&-62I zD4u&d$0@eXy_{rlz2M4G{C9O?r5+WE?akDaOh*G~ly zPB77t;5^Q{)VVS^6dusN||l(mj1dsg%Kk#Q7PkkhP=l8+Z0Rx{o4qL zkyAU7CSL-#c*D11nR}d=ho@P|0LkwR7oxZJZP@`6IdXn~+-sAA@8r+x?ld6pX2?h1 zIrkX>SQN5M-lCz-{jhEzm!}CbnxGDzCMcJu2{Pnqf?_LpnxG<{CTM`C2`b}hf;@Pd zpbnlUD3_-RGURE3Vk>x>prTQLl<+_UpMg}_5Bv`_JoXA21azDbt{ck*NdcM+TQmTP zu@wOTDZwH#Ku350&lfFK_JDu4rpIAHgTRhU!gb@hSyF(HhNhZ;$FUWG00qIK34nv} zKnq`;R9QOz15FQQL4%- zC&y8^Vv~Pe%Zrn1v=H5$|3q7o*enpSzrGDgopW+0Kp@4XUfSAy{pDHGb8`c2!Vrj$ zyP$SWMd`n27+$~ne_yBnCjk97@dn1~Xmm3;FvlBXxst*)$|x%N zSN5Oy>Wc9H-V4IDdG+$BxS8VmtK*ybZ{&tm;~dq>$BC~NDX*SH42!}?Kd1O*zC&f& zEoEI@dwI2`He@Fbaw&NWoW?zn{SKAg_0KY@;3_``c*>7*p7P@sPx;ZqQ-0+0lpj_+ ziAX^OPa@*OlZbo`{HMV~kQ*l6cN`onrY8`A-7}=7Mp9#B52GiqrKW{akbv?-`PG63 zNgyz*B9NJrF*8LdATKSYm6X_n=kFFTd4*{X$)A*b;#m6@Q$k-}8mF_9QQePga5xJ` zlsRVuu8hTE_4{W(=Hc}GB4JpVzQnMf63S0$fepuQoSM#A04|X!jqRKuG=}ZSSr3R@ z#p#RTNk!i#-}|t;~7DSP9%*WK^FdGnhGQGHmAZ?k39UX#C=0 z>Pu!$Hsea~;`8eZ&-><{J49@1u-F_H|Bf{S%(_ACutOBCmKC*PklpFgV2pP|=)kMoN#LqD_qUsbF_?;*m_Yi{61!U6K4+dudCMTKHidN-7Kb%Pa`X$&=#1uNB3Dynka-FP@dy-VSVy?e9ZEAQJ= z9bE$3VFw=34#%Sz^j6&m4tH$c2_#EF(r@%TDuO%jeXnerk$y35?UP~Jx3c?NzDMkR zdiRG~^Sci+<;yQ0PB`oP{)a-ZXPTzC106Z1nlA-hIN7tscHs~^PWo>Bg@|vKNY8=p z)~7%hnt~@kW2=_(~dOmyIJStg+Q$G$Nl%s`u8v7~d#^hd~pqDA8V~XqA>_f#p zb(t1kkKbR*nZ`fuI=7&a*?Esua^u*-=cp|_1UC=)?5A;EL7r^+Jp_M4GVdwK3S=TfqM zeUqD?+lXKLwXxA_G*?&G+KrrrG;tt1b8s-*0tE)fIa)sfUq-gQ%4tKvqp)STRkok& zOe2*v)05YoFw-;6=yFUYzT||_Wl^t(Jern= z#$84ovnk~)g~5WtVCqb2>p}~fpq|=oAtDI^E3|yPr|6iS?Wm|bKRVIcKIgo#PG9dI zCoRuWCdOyy1CFVuCUn>Ij}F5%akW_s)TJ6CX=1&N3#lF@E{zUsmejo#&2#=8C~A~Ik&Uu!?;0`V2dAEQQvQMF(H=T zjJ986Brs32@xdE-mS3+P$!~eGhrtE2ag{{rzof@XT-y~Dq>g2uT8~(T1P0Jxo(iTw z^Y-~RPNsL(5QnjbU!M1ct^02kiSnCw>z~S);g}=mlP4j8r!{M2d-8m;SN6EQJ5KfEN+WIP9eUV-*gvScyM2#;6B`gx?z1XO9PXD)=k=QJs za;>nrwYd>}Grb%*wlZ8BtD(aQUUhxa3>3?uXU(9eZnESktYobW@Sxu2Lif<5q!PAL z2M62aboV<>_CJJ&Zvs=Ip8E9-9ntgoHb=dgk#=2%?eKrtdk?rKldXRo7X=js-4zfi zu^~m8^q#cWCC8}Kcih+PZ8fAobV4x*2%qwj21fH;c+vLd0oZ*Eo z3+>`TXc{ZGz~c}l5Gdr$i!8(N*^xsET2b;5A@Udl=V!LdsE9GWdRkAp;*y{|#HBjh z<$S5{8x^l}FF7s=z9w#^t~O7U1)oSznU%S@(VG}CL~4*s&G`7SIl9%Vab5qzvQ_C; z8(NSsLDC{hM=ZLQNr3M?MOlrh$dQkF_?4kxejv`x`S&U+in6%gpQzWrB~98{vcwg& ztbI8!FGNJ^8%fCQjG(xJQ6iC2QJsxA`>GaTTG;fr$6WRfUMIigb+aWTsa-cNnTv9d zvwH(#${w>4Bfqn&=~Aqr(k=*%ICm7O;fzX_qiEweYG&HG+k|ACsbmi4lo^`iQ-jY* zn7;B}19JH6XSi6_X9%k-^lN#Fh^n*I3qrgnk0SJzpKg=3Up!~;@EWMkD(J@VDNazl ziSJb=tlS_JN+xk)dNRSQ5o^32(F^zn42<*l?#@#$oYy@O49!)H$W@f!5qx)XS;1$# zXtCb1(XSw?B?DoItF_Q}B>UU5Y?w+8*4rtb$uuPD#T8T+4jGp`1E=<6pIY*$%LR+2 zMku``s;#eVMG)kZwc5tN(Zf;MV`gO{5jgpXAx~Z7g?fdEuEyZDr--v~L))&a%NuxO zblV0ch-?eXq0|r%<03WYgWR@429S=2B+sL8KT*-@gn&)B%`vL4PD)?N>lf(#@D<3|p{ei@<}5EBd-BFZ}v3#m{C z6+@vBkB;!)Bc4z`1qu^mZ(WrS%`9K7ubgzYK4`WqxM}aIRSy}4bY+mwn&r2X%u1@P z-8%BrhKx$EQDLh{Yd3cL*t7)Y$`KVR`@|Tx-0u-40Q3^#LUzZ{YvMygp6e6YwzkKJ z%l%yn8xz@vN?6k{;FT$Rev)!rL5+DAH(F>U2b`*0*=s>cuy#xGbL)szt1vD>{vKmT zZ@UWeZPvL0H&m(qFae)A(B8^0GM(;WIogc$>W*hUlhL#8 zp*OLhrB}bOc(EQ}jVRYX{Su0p2ikx2*Y^7#f>$pyHQ1DT<#hPfElF zg#ZJR)#84^JrSZP1lca=r53GFiYb>&!D{f$Om_Jy7A6 z6v|`x#{v@zkefJ$uye z^9VGnfPBkFWCvPr)f@!>5kdi}j!f`o~fmBd3?jSam?p#zE25ZDwlB$U&M%7ZVXwk&lDhXR$(KfPi6Cox~qzxb!H02 zq&RBFX=5f%O7Q%H)=Ix$TkT7Ui+eis&KiVzUQoQ2T~g+x5sY&e0=rr?)aN5Q*NNHu zn4&y_eZy_~xL*eJa&7OrUQ!`A0;I9RGfisvcIyGp9Bu(QX>!4Jj!+XhX)Y)pz{Fp zMtqm?#^KZCB$i(=KL_3`oxPC1qa^B-Jq&*U`;GZw!I>@H^q2Cfky>FVF^^+d4D`** zcp*v&EKh$W;Gl3Sgr6ae{~1R@-lPp(_Zq#1n;x6u(M7SzYj&BMNK3H zmKxE9{kyK8_^7w{#r}Ze3-|Q)`Z9l4aA7k4&@JZgOoM3h4{h@Az7h0F|HLc)-CtI{ z|B8RF>7D?+Lk;`C%RlbRy!-n3O@103T74UuEIRA}&DDcOdAo9sRq4^*l5i@do3xoU zIY=|~s^!?df`B9mnwzxxwlo!V*dZFHgGNQW=8shw(@sh_)zeMdPWm6D`S5BF`@I(d z?2Oq>(S4!;n$^w!kX>4fq?P-SS zu%k3D4jNVLvSP2Yr=65^g40dfPc|H+8GjYTey=KkU5dtqR^NeUjt)Cc^ZuYw&8{5w zDtFpjQcf7UNry?qK^nxX7WR8}0ZCFc-n9CTG&nje0{E`psA1PUdzByUq?8khZqjj* ze2`}H)gF#}uL9VmY3|eNJJHb5V<%}2F&e$z#mi9@M0-ox=^*{2(6X`6Gf}5 zJ417o(dg~29FD4|w6|oO1nDPTCQTS==3cdM+W-=>yo^$g#D|m7Czvl-3_a;lP^mqN$ z+w$6V^AC!@`>W&ucRW{^O!xd%-T`i;(hXnczsg$>d!My=MUUpM@*eP;#7H~ooivGU zFIM{lMv>ppcI;5BoSU3|Ms4e#BwzVe#F0AnH~`Q;q9>spzJd(uqt#bMX7l~hZT@+Qe~m)re>EQnT>~W4RGw>d?i_IOXtK6#a~2uk z2tp1=1UEoKO@Exrzh`=$Ym-sbf1lT+Vf&`UOu+I9Bx@vn!%qkPIw#D(5NQ(*w5 z#!^rvZu(z=b>ct#34g>CQ4z57g*rVpG^`RJ(vXrwaQIAOKY02q1rW`U2TSO&Pr@qO zxoT7-5vP*?RXO7`sW{>ZTMF3uKE3*XAumPuzX?sw|5I`x`c$zXro>~OeMb~+Y$gqK zH(%riWNSEF9t5l72m|pE0?mw?%t9I3c(sB(y*(tW$71fM8;+iy z?c;IXwd2K(S;PHf(Anc)c(Q*jxF9JGRSI%1#qr6%!&WYIftaF+a}*lt*X!!j-|b-o z(a?~(zxDO{HxDT6e969ZKq0J0ZU1YLLv)ircm|93L|?yjDbeH9g-RVJk<}h^xTWozRr{t?PRTqR(Nr!*NUU?#6Gb-IdAox zvksfp>?2Knr}k*y_k^SH^N-TK6GfcR?a!Z=`@fD?p4b<>_?Yu2jabYBie$P`e8JH7 zzJ;#0x|ZfaV-=Y6d8glFvTo~YHTn*C{yHp?CDm%cl+6ob0$ znPtEk1Ac&-;;I_$?jtmN_wJ<$_E0nc3V-?UD`yNOggou-W~sCk21A^aJRjvmjxbKR zM_Q&GE_)6ZvATD);Cs|mxS+OiXzV44D}$5SQqm__T`+s5D&edZ!ZlY4WfLwZm;Nx* zcF@XMQoC$33IE9=n%`P>_SU+R#UK%U)?q#g0+W{$%ImTL-NG7+XiMDz1`?r zQ$u#~m!qIIz>>fb9@AuK-Nbw+N@Hx4KgqOPxKYvPLo;qemRLntUs!E!nOSVc3$vO! zf;?ROR<^c1{5Pch1`@(DWr3PHo;@}TmSt4!>W7_<-?VXQ8#_W1PP$FJ9 zEsc)C*5}=(5iRq9Lx7W%c7jrj;j^=U_A~R&`8%&8zK>I>n?7vq^~RPf5_mav_^#I* zLoV$&6?LymhFmMy+n4Si4xBwK#&y^`nouhCTq<9#`w60qJbhrH3thbJdqL`D(weG4 zOo*V(YtM33$5dq|v+0Y22>o5$(QVI#qV!|xvSzx>L~opSkqALEyruc5l0(~jirZ`wSM_<;=@hXP7=Z#O*=-D*=?)3NGO!!f_ zZt+{hrJILTv#{ab<(oo%$6B%_YQR&vobRC5aosVOL+0dTH&RK$hPZPnm4^2*B^ zRJq#kvNSZGP&pOe%Ap~0lYgU(cVqoy|E-0VXE>8Qm59KKSh@|9!nTgH8wdv6X)pId zA3^Wg1JgPXraJxa9d)3Z2pv&($bb*PzCI#Asv59{aiS8mbA8MRnVLTSS{*{%zsGcO zAebXe`k1TumArwqjDb?!mO{#ywnyHx4e0r|nz@za<;x>{8$%R{4z@R$ST5aV4!`K! z0ltJ9xy6(=;8cbI**UjgS*}|Qrh{)?S4+Wdr$!m8;&?~0f18e-jZx;9v-q47c54F3ccMXz2vS69^CBc=kVQ#MlYmq*1qZ-72T2jrBS zT}aL+yrMpZa8FIae#3N--Xs@K`3^}{fQVd5o?`kJy`cjOxsO`4d0AXrM8x~&_NPwh zmV8^`=<)`duj6@$g2f+*#b_;9EJFt6H8x_gu>=B34PPHLTMu0H=h&mQa!|!lCedX* z95!NBR^shd%DMa@*B^eK^xa%aBg!i7cS#N&UgTky8Trt0Ms399{6!{yPbKMjRyU`& z4HGxmYKe>Z>u2COMd{5q_i$FF^Lcmn#=syPU0kriJtWVi!}~{NJcO(q4>7Nssdc2M zFNi>7Mt|orvX!)3Nn~_bid{*JAgkN(j|_9n&o&rF>+Xk>?t9>$686{|y|1`_o}E=( z>E{j@ypY>9uw+hPscV)26<|IVYs@dpFV#25U;Xl)Q}Ah%K4Dk3E(g;C&bN!b;CU zNcCyPKF7_+uwf1jnZzKaN+(xs*+{iu$?YJRDF_x^a>IYfxcIER z(N8?Nc)h!TJ{nw>XZi^h@Tu}CN3I&>%T8o$>UX5q3vMzx>88?f?RAE1;-mWEB7H>8 zd&*dgt>Y1?YFhk7=|lp6TD4cR!3`MCsy(D2FqiJ##q<{hS6{)8glCZ(2v9GdQIR9k%tKbW@)%C7AooOm>~UFU{$4H$B@%vJt}p@nJyNp&mVGw;{NX20>Uxjn};0eujA zhJL-fc;8{7{ZZ((My4O?l+~A{?%eOUZ~{8T+-!N@)oA=S(|G8V)#7r9Kd%$`OhNAx zuTh!Qedsdt@$+tH4s5DV79IGu-rZm7y)g_sSFG{_v5`w5?55%m1mJi0V#+>}X~eq) zeUT$|+P-Hz+gc8KA~hLRbn!AeOsP`IBgeWp5q51p58cjG1rjV@Bah4fu({&#hxU`U z&)BuCu0rE^M6{=U(g%X&g^%42&QsK#j&W|copOwEJyTVfOYYf?WI3dw3pFLB?W>!5 zH#EP0#X=4tHUlU~(GzF=M1(H*abzL^?ZfX0T zt~3keH%5O))r{U7H}@p>cw`PZx&fmiH17}VoX~IV9SmFCKT4DaJc?h|!Y>Xpp>V}n z0vHZC521N?#g`U8F(iUZTYI@wh#Z_wZtcB?RoXaGoZQ~_vZ*vbiw;Y+TQZN%w5v|9 z?Jg9&8JHBZXe@q9iZxTU_komeORsHs7Dty|FLB%`hOtuCtJzeVF!&;@db^-jC`Cb1 z1aLUyu?{YJHua0(1Obl$jSFBejgF-3-HN5#LmgRVvvQULc99bC4cP~@>d6TIXEVdu zZz?7WrrXBdOB8s{ zp&nuDLjB39)HqxlaT$tUxp|v}-`9v!UKu+TYIvJNgXFg{!PUgxZ5O5)@67YgN1p6l zs>$=N>W9|g>drsv{g(Q??CrUYDpAs4|CW)?+jV`d;vZrcic?K^1n?B{@{a59QF4qB zA&(#4(Zx!Yj}OHRVL#wL8S{f`z?dgBkAnV$YX?mEK>|MD`S|j_q~U#?q|_H)DKGkV z{y0nOIqd~Y7HdMA^aA~o+v!)YsRBsqO{L0*V}&Bf>+$#_Ti0%6Gh2-BNAgsCyJtT{ z7ryvV{yJlrhMy$WOoR~}A4Zs*Em)s807}6!rtL@YDl*q0rz=(DF$@T&+W_Fgluz!CD@Gw;6w;uM6K|C2q9%Ol8cz=iqZO;0{Rcr)532^U0 z8^wK+UdJ{9sjpWOCOKFesgDSy`g=0d9)uIiuvL%(hNI_!`_0>c`~9Jc`A?46&D*_z zMCP@+GpwefJ;`DL#R;ggprb&qQ0h+MAroAOt8cgV4)}$yFb zS`#dCWxnFj;MMb_=Rvv9>5eWb|2pH}CA&Gsm|{0$ZpM>zX~Z|gcummTUZSSVe0|i$ z&Hl=ci;7Hg?6qxh9&ud@`|L!3(eXugdDH;`g-P}nOZ8T3#5acquy5WZ$CtJZN~qPJ za-rv+_x9(^mMk}}bxr6~QXHuaSQwwmvUFmLgd(Xu3FFz;y{EoA z8*~avi2M_d*5y3JZ*bm^5LxtyAa0YJz7UlI%(G!d4%hVGBUCu6(-&Or0sf?)L$B#$ zpgS`^cLa4YG!p!#{SSLW^;E1WV+L0`tnF$#iY zSy?qhm#g!1dt};c&Yz)gakv^2s3XPOaXuu?0k*yw_4bEkRjHiz^X2TdD05MWu1qZ z$!zGbLu-EW%4nD8Q!$fTwqlo7TPdVox91m?3zJsPSk}3VA!b4=9a@u;SBAPgqs0(4 zY>qCihEhn4ZcnsDT?d;ZJXA^s`9)=>8a7Zn8^}#e@rjt?yoK*^OW*fhn?H7MrYEfg zB(IzYXq07;fex+oF0J(NP^OvCFF(LlQN!0rG+|^AQSbKtAbRu+O2JO)=ow2zJ8s~$ zqTOBKHMD3i@EUBVcl3<@aXX2lXNHg49lRB9LOrInPCcfTzH>~go_eBdo_eC|{LYCk zZ|aGz_tXc%=DeX4jYr^+0}YlA1E-lhc(ZO-JA0WIZMu}z2Hh>k_t=9p6X~<;_ZrTRNzwQR z4mr}0=`a&CG>kW2?b^#x7C?Jk+G-E|EvNU4j5Jf}+#L5_pEs1Ic^Ek4M8imrnW8z) zc=OG!%N%7t(WXmVG1K32elNsGgG|56aj*6Km^4jz;E*#77d-|^^CRQU_Fa!S$|7lx z%UE&K-*S0RO_7wI38Y9mPfd{&I7Cg6grTNLy7>-BkyJ)akz_?pk@TLLA}M{A<6if9 zDl2{#l@-6A%E60`GA1*n z@ z40@?=#KtZhRzE%Z!P9w(S--8d)2z5kQPSkNPYZL&%J(DrMUi2w9Ygu|;yO&6Q|#)l z;vS#9i_8Q_Qh);%R@C$*|NCJ758K86|70NUEq+-am37Zz#e*snZ#ozA)r|~1uGN^r zWL+P3-0vt|J{_*>*_q3XPkx=GSy+QUg78oUP6m3~w4`Kz9Mb)tVj~%U)vYmB9gvb# z;YuqfWsjosa2V}AxHMjt!v3M!T2AVPYrluXEmRifKNbH+;i;Hz=<-C)F+&`Ht%2ey zh!~>Is|B94g6leqod}h3GI6H2tP5Iu>?4iTNY)>3VRJ;*Eh=_i_aU za>zL%wmqDkp9xKx$Eol=)!VV5|>o2cxCHrAfGkTncpb&;@&E3Sps`I4<0N|)1m zOv%HXJ}VRC4bmd65n9_o@NjosS(!5JkxEmRpYZ*#1(!lJ6}W~*;M2)X=N+cbC;B`= zffS8=Yk?%@Ppo}7DkRTX`+RSQ)T;r{gpF(yZ}X0sm4g>%DSV;YYKx!o0CVBoE!)^(n5%!2=nkv&zM786iwb$5}e3@4cqw~k!r0_V0)L= zg*#jNVr8@f8qO|PLF$Az`q%pe#e>W1&gHY0Hu)l6`wF38bEeQ#D9N4dE}aM!yQzn>KH{yQI;Ux9&H)4{Uq6@h&BIwcr;~p7aMsoTBZsqAB{8S}_Tel^ z>ftO*3OtHkr6MKm)$*%b(!P*4Mca-yqhR}=h|@fXd;pyc54H(Ada=aovd#0Aes+!T zUtK7w&ymN;urd-aT*OJ$=3PywPTJV`uB34r1g-Plng>A~C+e%9q(LM$B&jU|YXWYh zY_*^p{Wd)72{_ZYNR?#-*oU-M8iy}lZt&jjsf9#P+J-5!ofFFwWD>j>0$B!eYJDWY z^&_Bu6mnNTj}}6KvVk2eg_w>vR{QvEL;b6v#KjRJGR~2Ln}H`)LVEnkPVe*Mw8pzM zyjK@TLWU#2sZ$GMv99Bk)y@zU1W80S*4Oxu$jB=QM7=MLytz6-B20JH_K%p5&S(2< zOmB@5A^65R%Jdc~U&~Uq;XX^;r{c(`}GxcntMh zS#2Rg{XLCQ{oBa=w#Irt(t5uPd3IZrE8NSwj@%Ex;l)peG1wO;(XHWtJY@M4SO~?( za?v5x&DcHfV`y6j>8^s0zhZxWMSrs8O#k;=gifaH?G?Aj zCJM?4ze>gzbAec~JTE*~DorQA_jpX9TQk1n!Hsq%<0LX8nLK}+je;hTCO{4G+uKg> zhfN#2a0F~Gs8gyfVSC^(<&7|6qH&9ijl;ug|9E#Fr@M7{um zYUUyn=!z&G35u@uodFl!C%2-sx-UL}f)BzgK|>Vh{izfj)^orVs~Eny(n9gYca~0= zG=SiZ;|-fzq+*r1hRfu4toX*X5G1RNqS4|OsS^SsoLIjs@8 z4IRg@X8OwZDYp8_wx&d^z|%O9U`}LD+w&x_+#Ig|TqVlvJ|$xfME4PC?{~Clr4--O zKwia=mLm}U(zq#{@zzPjtQ9#E^s_AJjl&?-h;?`*8Hr93PTNLK6{PV$j9_NuuR%ZV zZQIYpjIFuzPJd;XdBRDls%SIz?6i9ekXoqdEcrF_R?VH)%(FFj2rp0m*n)9y2|Zh5 zbG1=QHBUQ*oqO;Fd5|}^b%VYk4J-OWEBx$iozb|LMpZY^=+{m4rzHN%aK5YP2hO$n zz4xxPS){)2ld+*`e%}0wxstht`9*Uza}{%~nIE4ovmFdo4sE?si1#&F9x)OvPa4(x z^zWu#9l{mBL-JPZYfdoVT)uSXQr0Dl*`8rJPH`!0;83leZZW>E1i?@UImvKR?c~{$wkO$78lIFp z>2s3)q+gHKE%7_zLN@gisl&v=a`Qz{8l#6E$k|>&(BD7Uq-V@wa zNPITv$THYT(d|tup!9b>pu1IetIWLYPMJm7?XtUNW@VOcw+8TZ><1)8KWsiWuB4rb zOsS4v1icR_A@Hnc6p#2^RIH24@w@jGk>wdTwUq(*)iMEZs$a&N8e+b!A0s0OojR^=a*`@;k4i%yK7rAJFm z6QH)Uo_o16&P0h!ClU%kId32+`i7qhgfMmm+VT{w2V{&4JYa51FmP)QR z#!(x6W~b59%Fgryj2zOUfG(%@fS!Sl>9qCdz5v~HQ7L^yc*f_oB<*efbv>?%K5q`W za#BvLE1wm9{O!DThY&2AyEK&ej4%Ai@bieSt!T_EsO)PArKi)0?kdvZ{GagFjN4vnd+3nESwNg(Vl2P(w1_Xy?Z^kx zn?EuTK)lnr0VZ`1g91=IApVtkoHH<9Pp27kIHmJGVeWcRn;Rrqi47im#+~P;p`D4$ ziTb*NoAJO@>C=w6&wW>v76(YIJNctg ze($dNcMllrSXuhr5L5QPQPMeo8vs8T0DtTmUl7aibB~YXj1SI)W`$Z5ok*B#o*N=L z$(5b%FXBt^NLClSDe^T7S~3^K2z8W+xxz0qsaY6g1OrXyiXDxz9*$8Du^mc7H~}C3 z?D|GL(!Z3fNYzEntUu7jtds=wnNhQ5A()2blIZANm|%j3Mn_rInQ~g5{?LD_$(NYa zJlGTjM((b^7>HG`%`(4fR7x(0Mw%z?82mel)BV05#%n+h!LjC}65Rda(bnHE_Z0Ok zICp}FMNtwO^5Ss`fwLf^z@I+fm}-^kV?0QY$)Dx!I1*auet&mEm{D*u@s##;lA%~dXAY;YF27)rL1iH7+9#l?fH+{= zK8G!o4f3o9oH6d&Xi|bhy)gRt+r^$}U}jvK@nEaGxFa39 zyWN$)%jz}NaM*RM74010OqCba_%TU3);+o6-)OkW=Y|(nx^PnQI9^*oPT%|>g!Hgd z&1_MFc})J??srnp`#vkkwNa_ezEs_BDM-C~CW-qg&LYdu@r3*%(NAWWEBF*=?{j=? zxS&%1W3uWeTiN;*>oPW%F^Be6kM>so_ST2(t>NvhvF)v??X6kutwrsv745AJ?L)2Y zL*4B|L+wL|cG0J}pJ72R0~ zQ722F1z$7uoyl@%L<=GET$cdDF}RzHaQCoF3j@^UDd0o|S7n}B?94lB2Xnfy4EG5S!vu$ndMhOZ(wT$6Jba~DKn$1+sZIW6EI%1# zcHfTUd*0W;_w3_rh^o=9-_2NwE79PKWN$Q2P+ip$RHblD2;H9ZQ1b;A1cJ?#tS{y2yz ze4tda(nOAOJu5a|RJJ#k9JgN_2!t zS@Al_1^yvslkrhIZ50rI6Z6?vJ_$Ed{f0LU4CQO)&N^_tJVel@n!7ZpSYPGW(cz;ND^=C(M=PmFi9TnlPItoV7tOIfJqBlSa8fE#Vys-8z zA>bdi!GwIA#vMbkp)bvG2>uYGs`AzXdgtqLHFbU1 z%>6XnB1_FscI<9hW+`tz2v8A+U|^P(XQMENw*Tz(4eTywehv?E-Rx8|Pi6OgBRo(^ zP;FD==j^%{U*X1bccVG#OSyoP`#fE>{5oAlskUWZlXU@R-mfk-onvy{>Yn%Y9(aU4 z7ztQPqa^^wvOx(|opr3&%mEAhdE#dIa^mJp(pjMPc=p5HalqA=0s7(fZ<9eHQ4EcfnT2t4E!1T7W_P%qGzl*wYurpno>GE>|bM4o4Li+7BSreTF zE4nuusWXAR)KI?waoqbCEH>kUls-!aRzr3G=JuZgBr4ARoo{xq`r4xWQ}895xXZcT zeG6F0?JOoTE3U~({v*x;l3xT!)Hfr)86d&bGm$%bZ0KmL_^8CYUsLiec)6W40br<0u3~(SumFG_xpr*x->T=0nST{8kwNHHqc#EIMQ0L1r)Yaur zk^bfwc3hJ+)>$y8dsEh2O*K70rvdHwS(`T@DDHn&?gn|1I%{)=?)=zUsi-DVeduQ_ z2EGWk7N|e~PyD(M)f9cI8Fx)K0Zsd(v zKRUg(@~4Gcd1hZO-_r`M)~`k4fLi>?NSx_TIY zeX;hT;{4{DF7!%P-$In?uY%L4i{ogjWdq%vP8|5fQG6odHKG)3wSYk@}!G8gI z_Di5q0MOJ`?bm^h{S|0k5&$$_09cYJsC`};BRfpP`V_==rkD`9>`cAi z+#>!2vfSV=!J>^?rYqp)OiK}g+qLgL2O17v1{y%0#J(A5SSF~VejYx#WJUnsz)Ify ziAnodHel}r&}f}sLW0;YLxL1ws-iye>mh+bR^L{Xs->7p5hM>pU9x`K>rn-Or0(^I z8&L=Um(5+;UzUG>%KgdZUnvj~)E)sgILPA3#@8L!6(oOFjW6~I1isuSkOlS$629p; zO4T#hxSw`Y_X*B}zt|@L#t4Ws>R+mVZuDQ5+sXY@$RgZm`QkZXdQAh2aJkex)>$rQ z2M$C~@#o0PqhWXbtXQ6M$IWJoYevX?zE!VD%?kv}?QJcK84+v=V?{0E`-UrNeI|l?Z zJ(&NxQSwE&_;*p>7#iOR7k{2mKD8Od_)D9ge(8_mvaZ!oRp#sdC^FZrdPgbH3YFAY zAErm$-I4h0KGBsQnLh_H{}>Y(|LK^ZCO$#P-az2(qLei-j2g#2s~oUF{MpxKeiaC6>hvG?#JywR@j;o}z)QiB*Rp7oc$ zZxV3xW|55#((JiFU;2K*VEz`1tO5h)y9?Qt&jJnR*9F`}7*hVBGRM37{iTz)Sdvrs z(3eiG3rNTB$+m225|CD4V6zNI(eI=E_KhZRZqMU*sZ{@%i_em!Cn!D^F0^t8SM3D z`R?6?_oat!vD{A$qA5MJF0ea3DBbdls*gk%w0kZ*FnHw6a`N4Ufzm^_Su#?C_Ld&n z5V#Z{lw*0~wZJ6>hQk&o77f0r`u)2LeWg!su|%Z??Jj+?E^sdXAz&UKRA70cS-@O@fz9Fs+Mr#8!Jy~DLxXm27SVSX zhDx8@W+_Px`nBq_R{}>A81`5^n>XMUVNmM15MaRT&9eX9h2GMuw^$yh27On0bzR^{ zd{Bnv7gcGrv1NRa^tUMnmEPN)L7OrV@4rkibC#uoCQs{d99e1|nElVf#4Wx%WN$+2R( z_l#FtL4+o|m1s zFlD841_j(uG3`#O6vj?8cv5m*ToiwK>?UeF8)!de`;41b z<36ls4R%3bQ)LaA27chQEz3!1++I)el-H6@J>?NG*Q<~M%67rMy5qe*>?yAz%f;Ra zbL{KtckEm7Uhu@Y)hR2Qh=F=iBG4y-RiIrfRR_W;riw!|NEt4&N%$~dTQS%_cndGU z0F{`Y0(%*3gJq`~RpjGOk++8}izzq?{WjR@l>(!uIQ=%N7OCBnM&j``l=0`mgBl`h zkyVPmJFmdL8y{1~p_|I&kAuO>Gi2=vcdfRzg)Q7BYW;R%IECc7?E`eFFM^9K>Cd|? z2Q83GT?O9TMB&?jK9fl|AlqR0%4v|Wr+jCdt-Dqu#WNw;)sK+kNJ)K~_-?tCa^>s> zWlp>Hro#wFIVE})hhC|1G;Q!C;UORKDvoIl(k2AV3<`-~W4gE*=;MhM**~89D&#vT z|K5z_$@?>SA7$S^y}vK_c*uQUe%_4q zH6~$2;D{o97`g|B9;6o2Nw@*U=NSQ^fyZi`xZvpzg_2dI+8v`&y$5aPU(fm!eo>tB zjDcEw`{CNWvP8|4e2sRPgLH($H5hvjjD2vvb*Fd*C?<=!alvzxrA)|zy1#w%N|=Lu zgo6&XIB8%$Yi<6FM9qSH4NxpgEl%o&CCz}>P`w&9ZvC?c=f5Z(q}I0BscjJEpcvtB z9hL+L8JwTnDc+K=`BWSmp^fV8vT<9RHBb+8Xpj%f?d?MK3IYXQZXw6uE?n>o<;rB0 z%A8)oo#M`aEN*WbSeuWH0Moz8#-~jv5=rO1g$6-I>oa&_C6w|p`gJjdm3rsWCda~? zPnw3NFm2c0y>q#9>2T-H2Z0=>;z=e_^ff~LA+5@tUs%}Rt zzmKk5ejgk=P#AlC_oSSyIf52uO<1~^u3`+ zdW#izS1d$tENpDS2leHW4o$2e%eGFlI5%jt9jaiuu<1}1vNBR*z?x<>eIh?6p+emyHFHsg#_A@pb!}iS@e&+=yi(P`(BeAze#w5u9|#*mIWsPUusdmkZ=& z&Imobf9%FftTV@m_I3`;CG!$uuR$6C^Nd}ya|Ro@F>*9^YpYAx7Ie|i`+x_;LbCrMcTHqk5`VTr{2K7F*FI?q?%dn+C6$8vc$f^2on}vF_A!pMbGmMai~)X9t26=c zY|p!Ro7TNs?wQ!hFmN$vTYArTG&Jhxzjc%MD;Wl)sFzr~;AkC=E3tx;Jn@iMFU(M; zaUU_mlb4TmhFmjJ4XQFF_wwommG2f$=O2_Ooqm$=@?>oBweAG#(yjiW>&tsj!XZEU za$RXf1D78+I!8g##9;JTk`x-79kx;4(KU$4Mkh@m3P7NGilKq2k7r%omfO}W&SKSq zRNT=_Xlx`^4nq+L3UUhHG2?7s6POe%g>D2ZBJ3NyH=H(zGw9i7tx8CA(gI~|3r9xJ zBG=RKjrHDDwP{BF-iUd0oPNd2NE5&Mx&{O2Nb?+tpIAlO-XhqDHUL*<-Cfo;OQMM# zah+`oQ{ZiXKfK7q*zhty^*XGNuVkuB13_zQNU~%7>wAk#G#X4bQkinx80XQ0{3`1k zt7OmwmMjUMg|G9H{YkTgm0}d~=F(h*6nX;dC}~OD9GezNtr$u6r*wfE{1aHAklW?R ztR_1Xi4+(GJ58BL9dA90@~+(Npx#lI?;D))xysTZ5yW_F$`5#G*L|9 zf;Rg3){zLlyL(VwNO7Vsln9DW%7%Hx`z9DElrP#PjVO+n0T@U32%91lmaPcJCe*wF zAMTW93olO+!JHFO%fk-ROZHWpvBfMGADH$8V@a+Qt?bFgv1YgY!j8^IT1@2rnYGzU z;Rx86aQ1K-7c|WRr@I=mJ&Eg4a^B`^%XV~kC(cf7K`nif9IF~|8-%&p#<+C9G?rgq~w3#Clmf#ooRUOKKj ziyD|()yR!Acv3-@mttfp`~4_E)e625gSs-W5@J+5bfNQT7RnQP!P0EVVf~rtg(3EI z(*;9}_NsFQ3P*$IlS!X>5_L*7oKNQ2OiYxRYByhXy1B@t)ef1xa>~PvkcS(k4^te) z*GbwOTV7|oqt6Z2t*xC&;#pQGKf-MoW2akkal&@E$IvEqdpbAJD&LfEr1`m+?Co>1 z&s=2j{^|!VV%)H#-CRMV3*&OSZ2=D@K31dsmbbk?R?qoHGRy(jOTg7mwedKnKPwKU zPpKv&pITIS?sw%|Gc0l@=i}kWX5f? zLN*^TCU`Id;kc$<;BMy_-YTp#q;TH5v45gPFHu_O2i+2-4oPmg$V6#!)laAXKla`O zDynW-7bOUY2#5$s7Eq8RNX{q-C`m=hS#r*?NlH`%L_l(qC^_exa}=5&IYSd0n%w;s z;J^32_x&3@Z`^mzJNMl&)B)|HX3d&aUsZi`vL>gMo?rS$6V6lG)W*ZRKR#Y+1FN?( zF@!QP4C+I>x!*IyPBYWr8qKD<6UdL_b6TmSe0+mgfJ?U%J{S*$yef!x`_=R@iYL3T zsW{3Fe{jYnSvUSGsw56Q@AvtLulSO(^t?&)F<-GH(NP0^&h9>-8)|auZ#vX#;o{2% z*V?BO?&XqOXMa2f<2Z%U_GEHcrP8MA`hPW(w0}6-Eo?q34ZM%Ta8^a8_T!4BkX*sb zcH{@Xp=7VErQ0zdq=m-3ww7&2d*F#IAsQ%77EowBTVOcLwwZy3`;hoG+ap_Y)y06) zWpB1k?`AQV#2;y=C!by{eTig|<;J%4rGEwfk_7~#0wm~(A5|Xe>t@l_w7H&(rUN9q`o$D-|;ai+h&>!9Yx;lf~ zX3klDlWln-YZW7aKeM4{!O%a+EYO~3ES7S$02XV3e#$QlOTkuSUPVMr>m0T93rS#* zkz3m~^*@%NBa5}RZRzKgAR@y?4>MJ27Y{T2)m|ZpBQ=*ZY;~F$?<|klNz)jrh5t}| z9aI_S{L3onO;K|{mjplAdJnFhQ4s%zRjFhU_)~i8N`#PgQExx8gfAJnm2Fo)rbHT9 ztd(s~KbnN+(+8vq1+O2FIuw`(l}erVED~+{`_lx9L$5yyB4d7AYvV6=R3b&lxa7}x zzZLi$@?1^+*Zb4sdYbzM2csOZgDLKj9GR;J$)>xxA&c_BWgYH`^N#%^%nAYFaRG6? z;-5-*#ug2IlhjLk*Z9JpPRG&C8{J2q<=okSjJKXC)=Fi>%4f097U<~i$?_EuBPD*FTS^2MKWG8m-xoBPkcbaqK0 zaFg(_7qIGX-7AXe?jVSTJt%0*tRzm0hqGM>rsX|lZeyX*J^fA3vb#wVhliFfi<)fo-x zpsn?&+|IB}1_?#^F!`z3<&2Di@2X_#@(XY&7qGZgueiqIzxdGUKw&TuXsNa4#8geM zJUnQH=5JngzC@;O$#M5>f%XGZ`2s7tH7?sq_?l$4{7OcKf}X9sJOlPb{I7h*U)9aa z+_EVd19RS>nD5MiCA?!ZhTt#)XO|M<6Q!f+4h9(w#_zOgo`2+}GLw^!EoHJ@R|+yz z#KPsnqS2d|3o@*O5(efOCtg^(FuqUvYlv)1VeJ~_w06bvlvm8(X_v-tUcF$Gc6qQI zPqRKd0*NH2Yhd{jB~DE>?Jkq(fwTffbbBrlm*?n1>Ha(KyoM* zH^X5#7G)-kS*)bFtm6!fT|?A-22S3QNv?r7Jbd%Zen~okvOIhX%b$~M0w3{^++-Nd z`x?M7Ix>Hwu$Zw+L6skN+Svqv0$abaNo$RJq*Ctc=@`g>G5bv5KOA`M24hzXV^>MX z4Vz*==NQF^EB#j{hgG$*!L+zoC;nJaBb(urA~&1-ICW}nh+%a*Od%rROvdl%GxH|U zpCiy$)$=Y_c_!Gy*mdPv(kez|t815Z99K&v2oGc`^lPrjXD;{d8q5EhW2|oebs)G% zW@c5?-H#(t`AuQjN`tkuNHQpQM+2(-nswRAt(5m_$ef(?%Ny(Vd;(?|VyIB~q0nC} znf(dmk^;hS*{9|COZO$;ilWxT$)=N$@cjdZeOi67Sc)YO{{QXnfd4t5V2&V*2IGBv z6y_W9nTD^^RmA*7iWxSx!!~5@PDM}u1^LAU8!}zojTD*-!_NTAS6K!@voWt)+H6b{ z3mK(#dyxdYFcpH_%%2&v;4sGe zd;R5zA6>;hL*zi~6K5`31$FVPhhn1#3OQEP=W+XM(Eb43T*pS&tfapMl6jn^xR(Qy zfMx^+>THggK#W!nVl`LLQ7sPGB~;1GY>L=})IPk|n86WM9Sl5SaJYML3#N}3C#qI_ zdCpnmk}P!}KgM(`d2SIKhjj|iR%muZ^klfCG3*_O3z^TymWCZUC=evL(_bu-ke_;O z14fTy1<_9ZIK#Tsl(_|=-B@^_O?(n+APz6z>~cgBexNKb-`sLc5>_C(rzBUFE)7Ne z)6$m}>*JF`JH@Ju`Lz%rGFbSJ#$-}QH0@*Lc^iB4lvm)vOUDxb@H98?XfZRH@!HH^ zOtTiH-2Qy0ouxiJeACNcl4t@0dHH6RLzCD8dw46R4O!E58zs3ibahxPun%FwUvekX zUz|Q@c9wU4(GNDimjeI#J&geF;Ffayq-v)3Uq%4FAH}HcaJ@HqF^kP3%S-cAh3kOX z6f7qwcf#|<=}-eOKye><1A9+6#2jL@4F^_)5ceM|(%7G)IRktTtIxIe_bnZd7K?=~ zkn&yb%;xd7;|^A$2Foj(sP?C`T;lx0jyj2znZGs|pgC-t44vv>_KMyPVwBGLOa8y) z2RAZSHjN=m7UfO7%_fff0b{O)$Q0M7E8iPd6D22knm8;tD(W^@PtWIMO%PO58guvA z9c!?bGfr)EKy#LF8?!i;XZCF{Y~`SAGPJ2PyRB~cTpzddADhJaHBQyOZe0mw@|RS7 ztNVJ8kTc`qBNan#^S19Lywu#SOi|S~WtEA=AntO9DMBaZJ7eGP`Hy}4X#MV;vHv_% zlRe@081E5yf?pve@(KH+5@D2gNuT6E)M?ntKYK*13(^G-zqWse6-jCk7Sl=JD0o-` zoYgB%6Ok-PKSho!U^12vXvcfG?nlQvTTZ^sBq2~r6Sv^EWZzUsw*4#6@f%ItI9{)H zlMVl@a-gHRgg_@=@4BDC|L}0QeUm@g_CTOxFpb6-9*cF86#uMPpresQRU015x*rkm zYzp}{wM11BjmEs+zdSryL^IijXEBCnG4IE{?#FH26m8!`$~!B=KN~={ol3qf9_Tn2 z=tv_`1&9i!`PauQ1MJ)4Yrg5>bj+t$VtcajZkRWUMv^&|;w4B2R*(C=qLr93J3Cjn z$;B4hPHahv)-g|37J%OIr^f;R=aYlzg<8&pH}&gxneKLdSW#w;KpQO7V#P`|sMjKt z?)^~D6cLB!smv;f_0I?EWK@l_xh1oGDa7v()HCxjqGaaLxlbFlFIv>?((#lJf}_|JoeXdXF(19nf;)3Vo) zDrHT;$PTfv9Mmm7W(|yayRj;qzO^D}@;tE7KA%VK;EvrB&9wD3q*~cEFtU3rEEg4t zpIHmzn*CTE&MipM2XfXCBMg3zyusV{PqfpRAxMp~CL_qcv9LVUTl~!LFz(xrHQ~I1 z6n!Gk8!;l{_sAb)vwxzKW(GlOm0cS_4vK~4qu%3Z*2Q>cKh}ox1yb~toORTQj^CqT zP|p5|URpK;sZ-Wu6gfN=R)EUN&#aH3Yd_Y7(+4SvBF`H&;^y}#9JIE7VvzQK-cxU8 z@W1aiiFV?A!Dh&wNPK49>J%nWetVPicM5J+*X;K-;6KPaydY!A~i$X$oj_h^id zdd60l6#i#Ec+gsZnLcxsBY>tgqUz(LbCtbkUlywU7ijrkXrTW^L!*xH8uDZ0+4R}t zXe}kIlhpy2Rq%SmdY0HA@ne`RA=%@M^&msYiemp;JP5ZdF0rYrjTyGbIZ*5eG)K$= zFJiZaM=AHBoKN&bRqwyur2b!Dq5p=LRQ#{M=E0A0Gv&(rI!?55AH+kvDc7%l^uN^| zAQzW9{K?G*=eIxnp9f{7gosFm?}FOtbmk;*v=cnHkiyZvs{~D0z$LBi|hK{m^?E+t4bzqFjgZlG$nJ zj*zqDf7bOP|KGh$;eU(UF8oVukok$smj1(&`6f_GO!=#7zPoYNGn z#L3gt?!@Ne*JEVLDx_)M`J5)31G{bUa*Tszhq-|Tn^hjWEEEffNFuER6p=kNwNp1I z=s03{Zr|}F-}xk-b}&2V5duw6H@Y!RXM${@INvNVRug0pz1ihkykAm|54JahhOcBE zX+_rxd4qcCHpfO5R{Zx&P(jZ9Mk>)<4ylNVXt)DwjN9Y8qfj1cZsLQy!;|LY6{1>! zP2HnrEgldD*j>;1&ED=2k<11H7Q9jRx%36}=Z9DR?gjM2-k&(u#l6f^D72oZ;+lqh zX_Bz8;QE9{^vJ+%kre*jS(c_U1lN=EwsjmbO;Q$xG~LWV%rHoc>U%$ris)_q8?VAL zXQgRcZ1Iok(Z1cnzrXvq!t>VCJr3>Z;oui9OisNX2h`x>3=#0(j%FIafiQbg&Z?aK z;6P=mE^4%2xWsJyX@7sl_%m9#BUMqW1jD!IyX0b+F|`iymaX_$-p7D8&oq zupvcvfjieQvo_IO$Md8vx}WZ>Ar9At zh1}t%FE?LqK`q=*7lqvrr<4fTdTFgIf->IyXrojZu@lq_yx3k74)4qrcHKWdMjWjn z;ILBnlcU2*cf{ON;nRclqro&^3*d3z_}asxn+RBDug%HMel23_bZI$!6LC1W6z`5W zx?k%C->#gRnu1#(wi|`rNaNSj+}j6FcN_O>;XC6j?ugUgDa6j;LgeIB{r;329K0Wo za1`|&B|TaJ#XIZ{I@H4B-QjcYRl*CxlT*!zqnTDpH^ip!BzVsV4$Yl9fr8@^>pNtK zxg)L`fyJpwO~e!&nnu|=>z-ZWwy7$+xII1xnLwBnA0zgqGha^SC@lUcnOZ5|a#x*l zb$3mTKZ#pB!Y?msn}Y8EFTX!MDy==)>78;vnOW+!sD-bTy2E$fb`bmrCvz-_J+Q?j z={`y`F5(!l8_E=Xon=aca=+D`L)ZnLJ4K5)O=B@TsdYPCK)4)g4!9$B5^7HuD5rn} zPcIP+h;4XC)&1GpG(_iS?aAB5iBY7Or*Oe?Wm)3!idF zETjof)>D=ro=(8wYb=O;Xs_mEw?(}B$;oNBLbbr+4q4{@0Ae593s^cH5cF|Ub78HJ zNvJD37x#E49uZLm58roK+B3(!*@c?Ra=5;CM+N~BunThEMH~lBAG^b0@bq~om>mvZ zM4UpWYLAzKYJF=@M&MhUwTRZrY{W@kx$}0XySl%F`{ZU#)zAIflY?#qA#lc&N6*b2)Od?|dX`sX#BZY#OMD6m&}RCn5oZf6breyHgp=k|d>=8JB74JglW z79D4$Q};)WHEoTMSKV$JA%VHYkw3{6IY*TWV}Ft@aW3WSa|`+|J`>gs<{j)+(v{uo zRN7@_W?MQ6>)Gpwft2Qojpt4ridhGXB;Wb*%s5y)nPBCabMVt9-jpXR1I?{3xj%)z zOKGKdJ&vn2xef*=XV=E98wrmkxH6BDZTtjOJ1wH5ls1qE2lHu6X`jfauIF(DJCRAX zw8lJQu>*a3cAudAS&yb(^&!dPdZRtmVEizgy9%LFFz$NT+P!XhdXo+$6-J_&x4oxFIlr`49JQ7KGm? zSgPpkdaF!L7%kC@XL7;P^Hry1?WL65hr>zjiQ-XelT*>pAIbTJQinZf9`Gxoj(yI; z=EswE=b^V`uw0e8@yR}iJKuF;VA8t>#uo!BkSM#Rt818>|2Fw z3Ph0^C$}%0R)3tQ_I^$;_wgrnz;nidkGs^Kem0Wt<?6x|eYsqH^RNhT=K? z^uqmF3wx==R3HQ2vI-G?9^!wW`p0u|41L6|%R$*XrI7hCMo@__i4lm`hdcQ1jQi?F z7_aLJTAvr~lK_d_h<5tB-ab;{6JHY3r(QPfNYuC<7=&HaIW>W|Nz1&2+h z{A2bh9S-4hkETGjyg#3ZcOHX6k~+k01j{Ag{vk#ZtdNYqB8HB)6pE7aieB#1zLdIK znf>9+S`g%vG{<$xsx2BPGJ5@#7x^{kBlECWyuYSqYql&!0;tpNzlA49m1sgaC zvry+!TkNcsKc|xW^p?8#InBT)Tk7hzd$Tce3CY3=MD)#)h4GNA{6KIEpNQW+tZ=({ zdCZ79zwMB^RMwrZ7m?#T6PTd*)`WTYw*ve@p& zySk3NpnokH#+Cv-nA}v?CZn|9)O6>=*y$A}Sno2(0p}Y!2W#Z8tp?9addvNIOFtwT zAeZ@*eoxZ#tBqED*P^R{vX9DB|FM_bI{j(7@hvC;?k00 zqr|zb_7X06BNI>-wz{!?HuG<>E=g;k?DhO-&oHvGWyA)?NKbbYvzaBnG7?Cp$fdkx zoOZ&-)E!p!PjXk;)X7<<+&Hpwm$%2*8wc^d40d{i8(EIC|MSyBvk2nj52_-}2 zQlwV|YWlY|*H543W_-r293K;66ji#P?Wzn@nu5~~@5lbVbnYFqdILM<+6WDn^0E03 z?air*(m*V-y>|YI5f^$p-)=+uY6aZ-bX<8wc?#@5kU0=t^HJ@`D~2$J6qO&Z zjl=j-G>l$Z<1it4QkMDGy~{i7b(wT3m5&%|EQY2cc19oUnT!?@Q=b3vrr3K=m-38W zzT**xNehOVc%p%;CW~aQq{R`fb&AN3w;7?vDdIomS3{jsp0@MmA>DMFeuUy*zbFiK zVxJrqS2#8amx+EYlw}?1qP9>Fdzw-Mj@whhBc|jsdzW}F*LI|PGX3zgwMIAiX~{8- zi^iT3V>$U&wdU&E`?Wt=7?B5q6f(oq9)+OxgxyGy`yrPRMv|iNh0})I<$i4%jeVvNU^jkN5&qjJ}eY{&8VJK-gjE1Ho2PiLc{CKPH*^v zY)_j&Y9>556f+*|88bWwUUNs%rJCeBH8y`YF{W#0wsKnP3b9lrQX!|pwC@%udmBk8 z+!0P)CS61HK9_##Gmo>^T>8wd-zz*YVM!*~fQ*qfQ&;#dt-Lk-c-g_1OgiUpT++i^ z3s31Lmqpqkn8aM_%Ub7Ak3HP8!2b)lU@xmnG6mH>SdXmO;j1=jIwyo=YJw6nvUv@1Eqf-X{jBp)vaV&;8RwyAp{><9 z=OK6THh8e!|9o9XWbh3%;ny$^I2D0JcsU*tvlQ4zZt8~agyM|b8sEn{) zwjd#2tFH{4;q}?XAR>dp*{$5}+>{hpu{zypl`CZ~ylduM^BmPHe+v`HO4kYBH)}y# zBI&eu4)pZs@`#XuGJ5#8LC&J+b)p@`0&&Op#V6%IeAnVP4#$lQ-S~WLlUF0k0O9n z;L8iCd{&vU4|lUR*Th!jS7fH1U9!H2$X@>Kl6U1bIRi4Pui=ir`dOR~$MG`fUrIQN zsk>-`T;7;5`|JIVINJ#KC~kMs7%+4*Z6*curjhdQG}$r+IzxdX9g7&Hnp^)>A<<_x zW9O>;^;Zw#aVfhmxM0ODENSBXeYJ;$s7wdnZ+*{)zzHJrjh)5BnUSUH3o^S4bW5M} zYIag=c(>oNidr@`jLDPS;ZPvoz>o~$$6&0J%)60=Zc?X`hm(atS{Fle^SWq*A1f_K zEceS1GfpR0Wvp0Dqx{O1Ygl^roKA^dIkdUj6L(M+^Xsagea- zF6G3;I>_6nbjZY-TTK|T=W$u=xp%YMs%mL8N-kOH5k<6SjAHN{>)a^sc*HWuDB>ZY z5YuW9h5o#jKKFbq%I(U+(3?gfb%@?ntNix*p#>X$$s$faZW8|2oaQo2Uy*?nw6 zkuYAdd-S}P3xdn8^sumUm?_lE)F)7bctH@WN*@}vZ`J8pzbh4v*-s}5) zx-Tk`d$S#R>2LDnUjYD*+BC6O{W0nCK~tne-ZS4Awx(y6%V`+~F-Ol$M;>!@@w9hI zec^EdQnYvDOAph-E4-i^vt-Or{iPChD;B!tetQC(~$!sY!S!dLcPMe(?(pay&Uou{o~_ z1fKAh2eMAZhNI5sd$Po$V&5Wo;XzS_lB{W|$Pg--BKbqXI8-G?_J<-#XbdV=ok-qw zCiLiiu)vejV6SeyJr|+f!jQG=I-^G#%4M(g_mNtNyl(~QIrzHe$cH3S=3Qe#>&&rt zUtUtNw^(i^{1@z)pgej%*HeEZ?{*eSW<5zBVHWCIJv!^sb<~D0tkj<|WtO_}?ManJ z`szMRh%(;ITOXQxnTHxS5u?;X%u*C0+9`BL(uTt=vwp_VpX{I&o(U?txU11-Qx zavG?AU?prOQ>_;#hWqW*0fZd4S2f58?M-88-cF=K9T3mi;Gz!{mY3v=^H>|ap&F&|MW(qm!-)eTf~VN- zItl1s0_d-*tSxjN%OxpBXq8jDPHT^|wTyY52o2s)x{thbwf;a50P0WOE!}s;Ix`O> zpim^I084E5)2(|!uf4OGSmMtCX?!64!^F^0)!tosR!*{e@vqUCz9KmVFf3nzc^J!F z8F|%AS-IvQR5So)i-s%?7zNGs@D47_qEI_iTP=(30y5J+^{K7NB}!3D;daHp#Pd%K zgebZ27icX`D|T#)HJM>W}f_VF%(Yde4iJ}?d9uUB|_Z=ad6i&W>Vy~(~-R+Ks< znDnJhnEFto;!h+eCVvY(dgyOQ|JJoYB5ZqlEJ9 zgPvlvxpnoCt^=yD=GsPp@EG-H{5YI;e8tfx>X{os!VT}2w9u3=72XeNVJl$`zu(hB zjj-`T)_#5$uf;2MZxOFDJ9hICV|C?As82yS>9%E(pGz}4bMUw)0rSb<8KJNP?nS?sAFM=S!m2VAl)zsF6 zo{zRL>XAN=RJkxxnsg1TO?G8;LBPw7Wn06JJW08dZK+5KM;rx@Ff9Tl>|u{$EpjDX zE)QObySIG2@U*23RV?BP#_Q@gxHwr&9)k3Ae)MRJDP|{#16h7yhPN)F*xu$)5sJowRB;jY(OlLJVsrKOo4tJ}(TKg7O{2(7 zxH`YnA`+`MwH5Vk#7SBTqU(Kp;j1{Q4;12c8-H!z+gxnZQTrhKVX@6X?cEaRqeO|z z9E#L5E@`~1DX?VR-GaRQ!?s5}j$Y@l6u$Bg@Aq~3?m116%&2gl{=_I1M>;R8h4*DrM@`pWLN5LnEO@(=m1=oDFjsoX#}_eh|J zj`>fkaLN!v#E{NBmYqI?@vcxb-Uzj9Bv>DS7JBITXC#~}9clF)hSc%q>3t$rtpt%y z5jU>NrxwrjzOV+>`^PeU`wji|)6K`xnxlqJ(i#yYINy5b(Fk8;RnfBS`dwDTd3KB1 zMpup0kHJApS!RA(x$pPcDh+x>A}82=HSUPaKX%Fw8QQr3CH{yiM|UVcDRodk)|*DE z9pdUbYRq8pvNwg*CArZePuY*cJc$UmC;>6a2a6^HSL{{wxP<{;rspx6TTzTxY z`4rszQtLe6*5Q+Hzy%=6eN#O28@)dFKV_OG=g991Z`4~|7Shl~s!D84fx6PUDRyn) zjQ~BU=2Lr&WlNyJQRw#hHpDZU#k@ARPPEnnrSCo;kpz_<6BLrzo=%aZ6L-!MIzNdt2`_; zd95>wLA6sh({La?cxwfI9SA`f61SR?YXRx)cuIkdGN7z@Cgh-YzA)rOf3Wrej%7?U z(I2TQrR?(F8i2n8K&bK)0IAxjmV#q<&H(wr+NhrwEXD~#`Goy}OLpb4K?wcqGXSif zYlrC?XB|!V(q0W$?H_%~(;9Nbn1@D-(^L2=3GK3v@9FX9hOYk$(&mV%uWh87E`_l1 zkw>v*eGOedkxRvh^CZxEpoFI2$*IMxgfZ-it<{5v?nR~j>@I%PaC91kOL2Rv?#Gu* zd^I}I@uQ*kJKFDiv zDxnU4u+tJ8L0Tl!escG=xYy%EqiUxPa~lF&kgT^_jZ%6@ClQvN^=*3Pd9tE0)Ml@F7QH?hrqhMQD>{+r)8cCI?I{&b2?syr-a{6&9>g*mXbMc zl7Y;0nAlhH!nuG99fs}v8oPgT&ga$~yNt*MYI~>hH*PF!;DRte|ERC)LzdFYYeQdD z;HYWm77YDct`n=CI`6LOBrnwV7cDI;yx6sn&!p4~8}LX!h)C>2D(4soTLvQNLklbD zag{r3`b>jF@$EDFppIYm-8uo(3+U~;M)<<8%7^wU&$qE9jT(WX-?m4LX#MDsZGSX0 z`gqi2;#Al#N6!IquR=iveh)>ePA(5(3>Ef+v?MN>OjHZ|nc~rPn26rU`6_*A_8j?Y z$9$8&gnb`ESXeI?Oa5IwqfoR6T!AaMSWMMiY#hZl@&)CrCDWI)FQSKzerX`I>ZsyM zo@RIvIpuT5a++7^a@Q0k0;#lWx)zN0p-b5@Mi+Qj6w5?T^)*kLEWg7QB|1mbb*JTq z4PocWdCh?Vm-^blLU?ux>Tz7ks;j0dwSc#yqM*rAYPEFTR19pZviB zXO3)^Z!R327ZpJGu91Rr$<_s}i@;=<=cEKxG);L<{(f8kB#ngSZ4QaI_j$)a3(o^D zYYw48Y+#-=y?Lg zFTp#Y((~qV#C}dDfPNpRVD}=*AR=56u+>H&$gFjZStV?5-bV(0b zRlmqv(fyjta^tDnH6Q}2d-7fx>{|rjXxQAr2;%+Z$>e&0Mf`na%^f8$CxNy~-kpe~ zb2~*Q@i=zBUdFqOtV54pTIQ0ls+*uzuzxcO#Ic6KS(!?Vqfz;iOu#<=Vl77WCExIu(xPl<$6R#yY1@z9|KDWufue zC^ybWG4Ff~P({z2RdE2Sh`-N_SHa$<7g|48LYC?yI&Y(j!}Rr*)5JH?D^^|LSt+kC z>aSg(s+dP<#1Xv@COR0M-$4m|>Ss?u^>zGV%x_{7J6KI)#L3HW36GiwlZ2Y#>#g-F zk^5KGEZ@iPHX;+YPw`9SJQC3Io1aDbHhRiJy#1X$2g{N;>1bw{&1apwJ#eS+_=dO47L@`%68O7T@7_ z4ap;Xy}X5Wcp|#2P%P#lA2|tq)>r8O`F*;LtC5eE45uutvBNx)glVX~*w>q{{9wA2 zv#A*3)}du`{V(XFC8BaE@i~XSY^pLzxy4e>Yh+h;RVR%z*M-Z5IyQcgsI3h{`O10D zItIFBJ1RYi+)#3=-%Y1k99w1O(&1TKDDjWB5VCw_Tgar>3Pd&V+lKiC{MqPWz7Pt~ z-dRxB)PaXW)jKy*Au60Nh%ag)cKX8b$2oTUa{B(PdX9Ye_0;s<*k@P7v+-QndX9di z>E#=VRX76;pm^yqPar0*)~5@kD8!dg-nihp?3+e0D>IjXhy#JSrLhe<4eU|;?<;E* z{z1TX%aX0MkTX_>8C%j9(#+ZWc3A?Gm`n)wzU%Z^mQ1hsH~clU=Y?~&cvg|p1odM& z^9BU>E;sd?*j|Nw0^+6pA8By-N2=vKz1cvA?-IK-suS1%CtYrOtx);fNv&)f&YaZw zv+TK(E(4W?UzIrB)lNzp%QKtjIdOxtEOd10vAuuineuVx%HMoRX6Gn!-ht5Iyc~(; z?v)6d`IywY1t2$|{T86T;~!{0^O44UHLu_}4oLjg$nO$mA3ZrRyKTi>>5h!T^%3cJ z-GX(?9=``#ys?3HJzj=-%hoWtitA&Uf~)2EL;rrG=$yQ$nDrYZD8N`$;zHE76Go`f z@@ozFi!=zNG6ojhb33oTAZJgYF81qGoEMR)jORt9`c*|F#rJXBW;__BBLcZ?$X75` z^pTKdq#DQrAgk8}Mea{63t#MeP?1uX!}9j81L^r0ke;8ty-zg;^1d=XKPv^SV=A-- zNBv@giy`f+2AXCohfNoAH}&gS_-#j~QVmp7o$ZnOfkfMKzDWdCQvpF#%Uvz6~m7e59D(76~O;9>w$(YDkuiJ*Xs0d&p>FuQrx z0EFL%(#9c;;fU0`qf)qFKKxst6>Y$SoPij=577BZwyrrZzMbzZlXfq*YdGCq+d%Ii z)c(F@`aHR;Lmz0!?!CRddK3&P7`m^QR|KDY4I67L?n!RdaG9s*fELaN zhy_w}INg>Vy&gp)9(XA#MY@#+sIN^qqS-)U@3Meikb?cTBiB7Wp*Od6hJ5J2d!$wvy5fiikb?pGa7Wp-CFhTC%@4=O_0f>!+3 zY`W!Ap+o@l$QAV>(lm~D*!2rr5Yh?%nLTDq|;~?X{qQ zdWxBRy7P=K&JRgjcaAlWu+1D{uc{@=Q_SObWck|`?0NPyH9*4JHdZ}W3|a9W(z9}f zvn=()RjZDYt1G@P{8~01)Q|^xwZ>fpso8MmT%rs}ew}!73TuRMgtRLBZ@JxM1Fy9Xl z46@r7PKc(4d&s7V3Mc4Tgv9`q{Dqrmr&6pRK=(2;j9Zy{-oLY{gM;Gm4S`gxj6 z%$Tc}y`m!}WU0<+=`y&jg%*NzPOk^(zoR833bLbY0zUPS#c1j>xvjOpjhS$HZ_WNV zS{fzGazO*eUNand&}KIQRB1V#xmb^(#Ar(O4?WJ=@1)U)cJGO>-iLJ^26rxm-vNZ* zxLWvUK=_>}TpX}0EWpV{X@;M6x#%M+6i9;3NdeQMMpLs^9PHTE0st1-Z#+4JMa~;} zJEUlRm+zxShRTQ|EAZUVDm}#cwz|tsGdzm@HOZUrd1NnBouq=%1qT|S?-n^a5#6gZ zf$v)|PEMEGuz^QMP9345(J(&ZFh+{aPfyIS53*-GQFHJ++7E-4)wspO9cJ6P*P zsGfDNDcmhBSZPDj5{bC2&n?h{D_%or#avbD8~&DAw`c9!T`avQzS`(_ecMZ3XxcB7 z@P@sxwWUVzU|y(+HtER5ek6%4=_T|sICN0VOq#{M4KxZS!qwR^k;I&w8D_qRz8c(} zWntac*GoI^Nn;k0_ShKie-N6wvANW@6i4jx?w+rPLw8x2Yp7_M1^T~70<#V$9B_!$ z=RI)P)|>#AJ$5Z9%H#dSQIifo?o4-rKV>>L$dcxSP|+L}twK zz(H7dAkm~JeHB7@r6R1U%f?!Fot?M9ryZ~OY|mf(*bq-^ot>uuMogAih)fS9AyYoa4qU#RPM7YW z^`tQ&o6Z|Q!2nk@PE=U_FsGr1k^w(^GcZf<#XocpkDNe-3kii`4&@elPMcdK?^btsMKRx#bB0(aSY3@;CuIZ2$Lx{PW$~MgzwIe8CU`{;t@$h z1^gA52PxTAc8QQdml)w<-Mtvvx61!!Wabr%jh9RTDd#J4+SE}iazsBzo_PqbPEYM^3NQn zu1B#lJ0bg?HU&3Yy{NC()3DR$aA((gTpC)5&`UUZA@(0pUA|dC2Wzd9X!n(veo6&m zc{_Ipo4*ms-zhU_+iTa4C({nPS$v0ywEKjuFtcH4t$z}sw`jF?OMv_qXMD8pXL(9m zY_9oNmsFVCFUR!RkP8yWKW43)iF`1bI8pgtE%Ur=*TuR!c#T7!H2yGXyFK;so3l9n zJQXvU;+9oO$^NG4agyTC2<@;Y(>VuWysJ@x~Fm3#_-Wvc(-eB|jZ7cHTE`t*t)H%w(lDxh} zxHZL^kY8l)0Y)qiV4#E67K;tj|xYIFzXp z0UK&}Xlfn-E4r*h)4BZ{I13+#V737JExzaO-iLAK?mj|SxH~k$j82qNb<9Oa$KAeO z$w09da;nmhA_B_&?59cmp=6Kv_-?#uh4eoiKD@o9v6hs9&la0NeuZuH-~(lfWYEJ) zPF}d`%W+0-k7%@_*Hk}ves&^!w%?pv4^;I{#=SWGyks7O2#Jrc-D@r_MJEFJl%Al# zZotqtA6z1ILhHzy?M{Am){kC<(YM!Q>m(}jz>#)|=wb#_h}J_qi>sTV^c?61br_);L>W?psCiDqg;Vrm_xcbTK+ajFmt7PxrwJD&2|!)LxdtJ z?APuxL{Pu_?STxSwC~V8<|*8;-aE*#_pgV6@6-=le0p+4aEfq7Qjg5ud0%bz7MKE& z7t!kchpiNI3WnIbb+78X{wl#=wJ%I?%1KdHW!iTI6PZY(PkPA#P_i2bj< ztHQDO{ldVjh+&I8%_}XWd^$C|T00qQkQL3sy*lAUxVl@=ge;Q6czTyXX-)BB0Z17R zB_RjjHi7e!+3~V`UL7Xc?rWvPxmUD6iBVa57FOAs7R`mP=v0$gezxPRgjYDF+p1HF zqA?!-)?M_$abl3gp-*B;|GbwqU7wdyAa~{OnON%5M<|+^=xoR_JBQynXj;(#9 z7~(m;Tz5suze>x9sLaL6U##$+6kn1vV38OJ5Nl`_Ayy;BN~`U%7XtBqws3Nu5IM_J zY4gY9qIAqD$?x%#$l3*FsmfgW`2xYCDF^@{!HZy0j;)77!lbsXYM0_QQH*pYt zr8BxabsMz3y9bNPTpM>yLhZ!FYWSK*orOu-@GXx9f{7ur^a}OoEl!bu*Jh=WJTmC? z_Tk=$p=?hS;3zGL71vxL=@L~<^`20d&~G#{Z830hA0(zMHgN1@(aP1b*wVPHslZO< zq?@~5*|~EV4(gSL>kWap0=%L2@}I?HO4k&|2~uyIAJ-r?o6J!)RLuWVq3U#4r~Fl= zjV+V6nUt79Q{X8g%4<_I(jL`~uYlry>pi6cV(2W|NW0Z43%E0RHG^Oq#f)!?wi267 z_9!!VH;rqD+^@i+7h}46?!Md(BO}KoX#U>TFC2fo%E8>UEJS%8)%(2eK({ctJ{8&c zjMk8eQhPuV1alj3X}Ja@uYoEq?2$t=lB-(x7tuE{A+QK6kWP|T{;S;EEO%Dr-^I`Y zga(8(FNAXf{~|L+CXbHy#pFtWgpGtkP;L3{8EJ%|^4GQ_Up)b9E#DASn44IA@rGsT zBejf>@l5ENNS6x?d!(IV^LIID+BMIJ!ym7V@}>yrhm=vW1|kl-Z~sB_eyy@|tW-I< z$l(yv+#BkT3v*+hd6%dmxESt}9^f5)tWDaf4-O%?a8eiE_Q^MkE{s*Rw~R9g*(B)D zMSS(5D)J#o-me7VF?sixFc}-7@~BKP`5WRa@7dyTKEZxX^YiWy*MfjAZpgML1_fc? zafuq%()Pe{2>`CmU%kVJ$uzJwm$sfNdcE|*)Rv5x=$n64!v^&7(W0u&yiNE?yz^}B zGeBgMHCz$cICQ9(xOoKcRnC65C`pDTHArs|*ZTsOxGE#yNUC`0f0{2{d6gI36SA-G z>WiL>yha$rWgB&X$x|n_AKOiidPx+~PT{bENJNE-{9FVa36}s-PVij%M+P5y?a@*Vsq{6*3ADmmx-2TMO6>q0^J(V2IA)16 zRy@#|NYp3+vzW?kIV%D`vkJ7$?)<|Qb-7^}@p$Oxu841}LRatbH+Mm+4-;ot%HQyeIP7BSTk(i+>Shr*=w`Wk z1Sl3R$FscR(qEW4zl&HGN>a`6cZ=**TlYFU{#j_gufm9*K|9xf2JK9L>_3p+h=m)T zvKMAVUyWYyDxK&l;f+0p>wx+L|D*a`Mr>cWDb`PuFSJkoL+uA>0qrHaysOt`^OPQ< zI!Sr6ecAUIrv=2DyRr(6G8yGP{h$Ku5OCEFJc_2OE0vV#7s;sN5=~&32tKX1V815V z_O~SP?*qQ00`kZ091U=MgC|0Cj|e&rCgc*krqpi;OAk#h31Q5I$h=AUT^{a-S2K1T z0_2gqdnC0i32;)3M4^2%S87P&#T9480QP7R8^+k<-8IEb&~b7;#JXbK3+O0;HjByl zU&Ofd)UVgME)Yebr_j-d?|aa%1!Qm-GS(*4BYCU*+Y?GF0{BJkNX>586E(&AqreJ7 z8A)KNxIm}kBH08^3C(tuLx)Q=ruRKL$wBKNp7m>doi5O`-@x36CTn~=V`q52x_)`Pa z4~v}e{C!fyRZMMyOp7o~HPGA5vg*!;0#xL5y6jatC7B@I6POVGJx~PF>x=RY$|z%@ z1dN9?dMxb$1VFNrj0fbD_Q@5!5WtUPei7W@%OB!b0H8O02v}g1bwOW1y68QSa@=3t zr%Y6rO2B!d61{hxsDS^irMh)>qPngdR4Hq^$3+PErdjdZhjR*`UfwU&y<}|~3d_HF zX4s6cMEv7hKxlE~KE9PTkZ>6A{wiLuk5=a%hzzwKqz)j1KbdnbR?Z+ueR@rd3 zz*nT)Y(AQqyMMq7q8Fqof6ksfeV4_)9c+~8%@W{1&V(yxdM|~%X3RfTq^&-n^+Hkg|z)m3G47fwjx7gQO2(>-)zoe2SbXZO$E zK(c8BdqW?xrqt9rp{Wh~vWa9BuU$B+stswcc?>qVrDc z-?PW6J*SgJ6@ix8#yeN)Y)6Qz~uP>B;4JiNc50t-QeNYitT{Drx zNU@Gg!K*wbw+gYvEY}d!rPNWeA z+1DQLzQ0Hkbv;@ywR)3Wf4Uy^0UM`zf1BEp?X7;YJfh{me#hrrFk-2uEz!AO#bTG5 zw2;$`rz9|jLH>WS_vZ0Xul@gcB~(a@HAM^A$sS_RiR`7aW=mPJB_i95td&A`$x=v4 zOxf27NwV*^X%qh5HV7)~Sl1$beGsl6yZ5;*aG7CP5v*Htl^aO<@zORbo)N5Z+@|Vs{n~N$IbV zJ}8oMqXJ7N?IUwfW>D|>-=0o&tcu1to4V5YyPA@HVp1jGz?kKK;{g44%U^PUX`fcn z>Fsj z_^O)ap^r|BL*=s$0SQSro_^D^ka7b=V+dZBSE~6pF;l|8|L%0x%LZ1wj_@1rFKmqo zf_nXQbxEF`P4j<~v6jv~W=b_LzNXYWEwcWU5y8uV^Jk6A`ab+L&JF3Ryokt;ZWO&g zK31*LGiSoa^2oeUXU_>Z)8ziib@XTMWS-nT$vjCu`BODIe8-z=R~r4{CGRBjTQ6DE zEHom=gOpbD+WW*Mm?qTn=6#0yXv})keJWYYG}bo^{!q@&u>^xnc8iL0 zJKb{hWtvXd%TM%j?qibf1T1RKp@{R>vi>FW7Z1SjoHC@NwnyxN6O#)2!uxDdBlymVfRu{G7@2qYrIW4a- zO4{9c=*Q#2xQr&u)%pKB`4rXPzPa}+yJs8P1%r=_cig(qvH{XQC0->z1^gt9TigG+9-r~r>hczqj2X(LnEF=xr{L_8 zV3U6}MJDT+w4Z?KtAkhN{)NO+j_=*FLjxDfEMJN&v6vCh@MnD6-wvs`pL#m3h8tnj zrT&}T3X&=#_if!1dQDP642mSICVep7eSDcTYP?@J<{;e*K{!#tjA1lA?f3M~73f?Ru%Gv6yj zzwDym>6;W5g{FNm6V-XHz8mf%ANb=99IYwJw={%b^g`__Y14DUGGNwH!%& zdQXw9GoKJzEk>N9B&HuwG!q}92TXxZ#xujk}H*bd&T^0oT4QrOe~Qm zeY>qC&3V#Hf|od)BKx`6QT|7N+gdvQcgrpL|1e?Z2xc|)4wKs9T!9*C>?z@)%pY$c zQFT~KEv~_&mCwWE4COt2_lDs+w99#PX{=57(|wlU+r`UIc2XOd@Y?uH!O5J<1$1Be zp7&Kb)~dkef46m(Yaw?#uAE{~m8B6gN2Y4Z%ojipKcHQ9Qv;+7*X% zsU}QhY`h-BcZ*jrbnfXkk)HI5gHti^96Rt_Ygf*`hsRjO&U`7hl|#U{v zx)e307LcKWKMSbemF6`WnJ7?0&KRIATk-3V4@7 zGlpBamjb7btk|Qw`;CcM`n??Z-u4QL&Rwx4A~yHl!fA3V_IB0C^d%2V@EsMzs8}B+ed2YFQ z=U!?%TCRo^>r4dMupsn0Y6)m6N4ftX04=TFkZ%k>@{qDe7 z#Xl%^?u<31vhlNpA94Pm(Me7fvG2hJZeRUfmHUDZvEJzWgN$FXk3oRt+uO(?a)_54 zs2SPnTM~H30#-l*^^l!jP;24^7x#%`(SQWhkPuHql7brVw&U7~LydL4c}z2wM}p-3 zIo88!u#VkccoVYKBobtYlBJQ21lfUfdf_cekexD$MI{nshgLihLW1nTfW>JdL3Vs- z#)3(Z9X1;|7zqaF&#@kFFoFUm2Pi%%umv=a6x;x)M~dPC*dYZpf!>pXS^#rPNw65D z@3woA0NI|v;E;lue~j^jNHhxgsg)FqIwYWmpm-vJ6x09~r;P;E2&5UyBmp&y0cwyS zI{0g3t8Yj!7>q29#v~XF1TYvkNiZ0HjP=;OS{R6N*u)cIB*+c{SezCTWG8@TEP({s zf!N3qNU=B|MoA?>c4%1|AtcBS49E@%5f-k3Vo{R>*!Xj-hupxgLI^OjRTwI(mhct! z?9&Zfv_iSJdDKq zBlCojERBT8izDu2-b94y2olG`NE#2~4To+oD2O+nlK=r^ERD1zKmZ$vRY{3AK2R*4 zB>@5`#S_^`Kz|58|3(tf{~pa)014<%Ya<6C0sa3R>p{HH0CH3ZSsFD-kevh|JEXWC zA1M|uksv#q;)w~Q$PVy2TS<_e2Q*`;B*=~?kR1}dPAKp?(@21gKgW8cFbt%Yje+ct z;(GkA&8)BI$Ut&9iUipa1nE&ya0hsuq@=b%Zd#B8*!Xj-2hr}Gt-1m!lE?VJw65@n z3rdI^_)<`h`@fo5UoVJl6;()ZHi$2(5cn4wKx+B_YG!@CoC(<~st{jFCcdZwin&OT z;oGV!5Wk1ve`{S~ef!EEV>}3Nks!SNznWQJ-~0pHDyk5_{{=yOQ3WYX0O2j{|7vD^ zJ-pp2s*q5SBfh9Y2uCl$@C1rQ!n8#UA&U_HfT;an`1}ZTpBLUD7$n#C5wU*^Urgfo zLej=VNvw*%kfc>r2qad8NUo}oSd}4=RFwfamO-$iV5=@b!uG|jk`Pgwp23cS1Q2g* z)dl`n)&S<~34sh>AxS S3at}gJ0n=MFWJ;?A)cV~D76I{z66lr+iJETp{BG|5+W{3gA`tCQQK;F zAgZx+-PieJ?GAsoEU{jTv?sdH1%$T<5Z-PzTaXam{{NvQgcme$4&p6fxO&k^#jP!h z`7hzGD49{nK6yoXv|tpY?k-37QS^%UFkIp{9plawpymAJM$7qMT4%LJs{Ub78>$%j z0!mDO(=pBhTF!-kw48??S}VE*|3f_Eg9UZ>y8o_gS^_kEU;okc%`V1%0}48EHp*5W z9%Z*XS$@;ETx1H`t`BasT^~<7#=QVM(T!f9(Lt)niaz*`P5bpbX+Yz1%#X%rWg6ue zHqeQ)-U}qdW(+^P?Ejm7eLK+b|M^G5|M{EezhFVlXQLO0XzFi>Co$9y6^4K&tc|jj zY^jOlB+YMn#(UQq{&#OQ{6A?82}c9MZ}b8!%#qia+W)3qf6^Z`ovZz5I#2dbuKkm& z?+5)H*aQO73qPY#gS8-VA0$rvJj2mFUU)sN5l1p&)F&@kH~}=|sDAOVlOslc@E5_2 zS1pud8bCM6e=fcd*|i%J__!AewiBa0qe|e$V+kBLWF?Lgp}hE2E^uR9R&wnq#ZDpw z2+0O+oCu3t;{h@9JDLP;yx0&5c(Ct32Cq6=VT6POKnS|9+%!h{nE+ z6Dx=YpN$hMh}Qm%6Dx>D-i@85L_^<33WsR3vys9f8u$MggSL^ec*Ctkf3-+SQ=eO zP`nwSc;MIqq7@G~{Dveb-XCKNi_9Apa6=sL@OR*<4{DR6>p<;lW4^QaSCYNBwq3U80!J-%>dW~We+4N z)ZeIg5>5S$J}9E8Z@+%7Ao0}SD0LI9cpEKnL@OQ=C>{yk-j8zyiB`Nn#`-nbLxa@j z#>sp{Q-7maOf>Z&U9f~cpFV*L@VB( zWBpcDW2>sMcDNn!ibr%oYptrWx>eQKs%mUiHAu*?ZB;dhwz^wYjjgH%u^TD2sv28W z4I(xXt#4!5s%osA2uXCDyH(X7A+Nqw)kq*A*nwUCzYT&o38e3J3t*QnI(7#pH z*s5v}(c}br1h;xMNaz;Ws%mUiHMXi6|5;!5fA7^mRQ4KVp0IL@A4eQ#@{zpq7N^hJ z{Xz9q?)6i-)D(m1&+Wd_Shqf%7Plc_#zUV4Ufi!URA#a*Awr-yB4XwHr!U77D4cvb z{_CCMoSn?tWdi?vvH9d47E_7NokbPqpg;Tck5`(%du@7U;ql-|y_B4wtrB>yh{Q zalpWvL)te4w#IMKk7)UU8jN57gn^#D3{oI$Yy1}dh?5@xflxm2M9{g%MhXOOjo+dl zk@5o|a1^v2g8scU;zW4e3)~vNML#0tXAJ^@7YMrejENNCbuVyh{1*L)lppA&kx@ZV zIqg6gMWHL8mrm{thVT5xyT>PYN>}i7l51BS(xsX(k+JbIG(9m%5o_YoNe#|Aqx^AJ zo3>c`7Z3gLf?h9Z=j+-j@ak_9Za$ykwd2w>;3DbXh9+X^_j2HS+bbwK>BYcDYf4*NFFTDx|o;&tulxtMP7_T;x;dca{<#4JFM#07Max&Q+b7l0yh0a#rU7tlcJ z0!Whq`x*~@8#&ERulVfkwzNb^;nl72Tl6DZez3WtDQXp_^{1*L)lpg?r9RR`}(u`dp1p>FmZ_$rP`2i4U0BRzgUVTK0 zaQYYE1#XSsq92j+10WCuAP}4b363%(-V59szePVH<;T7Ts|#u(onEp;itsuFZjIlf zACd9{Ag}>IAUG595|JYOx^`>)7X65q9{_@}8-dQ|axB`8gI@u~ja`u+v~($I*4}~>XJVmCUi9InE}6CIk@Nr>IIoRwugSs5 zy|LgGGy_LBUZL~xwf~ivhCtywmPT5G2vA)yA!Y&ZNnAiCsSC&@aRD==F5n%B3rHY! z0XZZs02ztS1~n1*b{Q+OE>@zXuwZNa7X65ppA}nxLNsH{ER9*>iBtXiiGi`L@musG zUVZ=sz6UiC`1TS@5+HDE{1*L)lpg?rnE=A*SsLGv0)hXl$0J!9`#TVdex2^Qf6D?O zv|p7_{&=C^6`D7DkPP%UyIm`DvvU5|1@!HOSek$KS}3R-(Yy1YziIMOYGC#GnZ?dFW!St?WV`nwBu^LICeYbiuR2^zf|4EAH4{2)2R^KMb2V zE6WcH%fzbVYZ3^Hg0R&ZLKJccEDo~NKv=AT;WJ@+*d-(mjU>$36TU$h5rl3C#u!$# zw2-Mj_zhiE)*>j)D2Qa#lxECCGP)DO^JW60;sQ~GI~Qd=C$D;V5DvLBCLkG&r5TMO zcK6MhI9$LrK_7R4)V#?HVnya9xFV z24!xdt_!2Y#vu=?=DpAiI~P$qb5qH@YU!a z^X6hw*QZ+ha-U`zYNn$X;#xdy6g?B%(JS-IE4Kgo>-rTMe`(57ur_!G($)(m63af#Iz9$sY)! zbGTwifot*1^ymX)R@!3N!rlH}O*+Jx_`8IWxlct2+)&pu^Z2^K2p7l|?EKvkTX+531n9;M#{O>6zSB?A=k^+7(O| zTD$l;8=M|jm`k&c6jf;*z zVK3gmZZF^hkR5gb$b|9lVAZsDhSxuQ|DMp}K^U#tRgOcvaAy|sg z#lDZmEeEqgs$4i9j2eUggU48rEG@cvhVUMcA}O^paONBeo4rPYf4QvEjOe8wM9)2$ z?;v#bNV|!yFEg`<{*3Gu{N&i2qlZiSU8qL}_G{B%r3+=?Xw~VJ>>{Nzkdd;4BVY}^ z?D1>|`x}B-AJ0r5Xb6s(wNMKF2?38j?SgFx-aiMXW<=ub zaA+a+wWSRdAu}P6PanZZBM+4H@@Q2em~f5N4R|aQJS`tlqYN`R4?)*s#W~TagaujraLr$VlfJ5P6>BNtPAW z^(OTv&~0af*pJh3-{R_C#WXt)zLY!ES{ElG)y5NalS4}33?xojtS*cO6#f8^6yu{y#Lm+E(~Ay=ehqeTrl2csJ9+Yy#)D>3E=AJ4?b z#w5~?CgCJ#*>bycb0IWK<0hDK-h?NUqnwWoyJ1h+^dC!0%Rt)e8cGld<30<`2B9<| zWqtP0s=B$1zRG}HhZs6IJWGXo>9%V7-r2=O z3kT*{cH!x)akw9r`bSX@bqd>sW@S)QqXX~o3s_z8n z_jMQ!UoFBdXbz;gF|GFB(lFvbo=lOHXwJ_)Pk`9>9z`UvS}V(EI8!C}Y0-^`hT3p{ z_UzcCqrIJt zI(|;BGFR!F=lx1~k|P#xT^XvTuv<9M;}vwvfUe)Ez_!y4s)WXRBtPsJIy7w-pe;LoMB0^xJp0VWxz++P_UtceEv`!b9{04wPmb=b zd0zRA^;Fz57VV>gUVhr+TwP=uqQ1rK{7g%F*WS-`h_<#;I!b4;tJ2@%vJ+!YzkPmu zQ4*(_HIn|aKUqJKrdRg%^t1cka;b{G^>Ud7F=~k-!XCSJr;hS9R*OG9`6$-dyWdVF zh*t9S`w}UoQX7w_dtyB%(Hxf(q2Qlpcy^S8I(6K}vICWLj@Jrw08 zi#t0|mYnhVtib&9OXlaK-cU<@)wtAfYavihX&(K}MZ2_L*5%$_yXG@4b{L+YBVL;#d-fVq zGrQelbD~KKu2FF7D-#SnqvkD;Kn>L!dbb|0LW?_~Dyc>bL$lCUv-CN_ogDMhBSr%dX{3U*xoAm?&o zWnWNW+Pe$S$amLqV?yp~u(gK>M(sj1!-N+s|PHyLhp$OpijHZk0@9=TAb=1vCEWb3@Qb}VH8R;#YJ{iYkoM- zDGvs05#=tsTQ26R6x+6aZ`-zsZDRT#wrSleNv>I?XT9U^2R}tDV|Y)azBQtp=`G$@ zEVJxpf4%L(;ZwB8*4qVdEtOMFLC)1@#hz!7t2h6~5E8SHH&(%Q`8>~>K zd33)AVWa|qAk1RCmixS*tI+!U(ADV<0=i0&Fo!+{L!Ws_SnaQ3lf})<3>HFaAp~q4 z1d2mL?1SgnP^KP|BM=CL0K+e&vKh`I7$;l@BLiLUI?gH*W-3Pr$P@g1rFwkc0s64i zj%#>$DF%-}528`QI|`OIJ!To9Bm|^I%r{-)dpiIEU}?se(7R7t9c}< zq7=IjRlNXXMp8APPM_Mdw-_=Ui{W^R?=~!SL5vbcA!UF!QwtZz12T263*P`q?UA^_ zD$ThnwjwtC>iA58ExKyz`}A-Xtk*{Z)?-_GrVVfiJB1>^+(li!Nx)Xd0}>GUQ5OOp z2O%si!Sq=1`AB5YkXdA&StQC#JFp{2uNV9qtXGU1ytXtT6woacP}SLopR?}slzD^9 zjKod1xB!x8vJsX7jA4+)ny-Q=SdYhvsF{UJo)3hK4-C}MuVT9}UtyR@0=A|bQi2|h zsw%1cD=)h3=7FqPvumi+0m`+_!S5DN^FmHK2n8zFb_KhRUW*Kie$2KIA8$QTl}wkl zU?%+VD@F*-Z;o+3;5cg*Bw+4l6!=X67ARj9A!~Z!R$7CArP~9BvYgV!9HX6#m{l=L zoR~D?{4uSEmyhS1KhgZq>3GTKqrwlFlIXa5->=Lr%WHFAbdyMtNSK&0@~v@C;YS!v zjpy_g)8OrzIucXZ=&-%lJd(f7nA^*DSB-PzQ6e=|MPJ3bxOKWKO-QGx#AszW6*mps zO0_p^9nnbbmP@tBr~dM7Qovh!>_B;&Ovm(-LX{M)l*_zgDsQz?TX|_zl0t<{_Ulrc zmmPq+#Ji>y7pBgCM@6^QyOZnh6bx+Qzd55sF8D}Dk>5v05hHf9WZ6;neBaI&>}B>1 zsPi9C$J5TA424DDKCxY#WpKnET0&pL<7IREj>sacC(|xv6Q88F5F{HKpAlE<#{+RwqRv?egpJn<S zt9dw7jJ)qwBZ@c)du5N?mt%J9S0ax&((v$okscZm`-C7}4SRB#{b03AC_y@^2i4*H zq{Z%&Dn>x9C-C!?PnYh8ACEZC-+Vv&c-(nG;row{f8si)@-Fm>N_a6MC+Z8voo7Y} z=iL!{KgnDA@LW1qQ9{HQ40Bp>)MW<6<7Y zVo%ZNK85zuUcUsRtI@_gie?9E!rPQ#Ya>rT4`FZBMzl#r(OCUL6LH?nhCy(Z%ufj6HK7Y zGKETkN@kx_$8B|$GzXkbkI6jf4v5(4nH*c9B|iP3y5tC)j*qOSEXXC+vW#7Zdj zd3K}SXY%;PJ=$IoCiJ>A?Or)1M|5e$y&ju<+NbC%^qfO&7m`076~hp$*s=p7Yf8&K z0Ea)IgX}i&${gmN@PL~?^l*&>Pik}~gV&TulC@k)V*#U;oy>jiecXSU!+ zaYMEjl#%|xnWqfRid4#6SH6VLSNc;ampa;*(>0qb9&6gIa_nLV-GQL1RLb=Q7kDCg zQuNa<-i(k+F|xXFDB{ufzz^3>QAK*8xknhAlO}RI>v`GthA9l3;%2vebMaVNlGQQW zoDg5F6g6(d6FRNCc@qq%+sAAz=nljs(j6dIKGy#^CuHc^W~{viJtiY{H!zNBUdvdv z%d}I!wCYy0NANxT;f-}`{8+c&L`%sMB}08&QDw>1^F_>le{pj8{Uxt;{`75rcFED7 zU=QDpz%oAF9V4mH#^;0a{ns)xT>?sa)IM<)L{Y0F8m#iEYVKDgKl&z_^JrOLQDKe6 z$n$-{%cjgz7U4}$MP@)9=8GZW`-865oc|4VqMDLi3Qm8J{(RhnJSg6`y5#!aFoWvG zm}CWSr4|J#%VWDYcwATY4R=0r_Ans7>3>B2%yCyIi70#SrHUe(rZD&|y8-aSIg-jf zC1kA0sieVxn?2<+_oXjU_U}T<-#8Rkmgt_Br)D@1pO}8|MIt=p?vU1bx8DlT#Dyqh zokn!rT&1{&5&-DZ6EeH0kWcJPGZ_x}S{>_+zb&jT$Gs*-EaVF}%cBAZ`6nx_cF0qA z?7zzY_Qal0sY1gvoiFF>^EZ*D-6K&=*Pn1_k3cMf_(X-Ktj@?H3ty90<3jTin6wFfU%XM@C}r{N%l@j_Scna!g(l1$rcH;@=Ykk@T z_>!4LXuX*Pk|jlGPo3Xm)mKX<^IL6*p;R5SW-G6KaGK}p)ryP#1BV!w^y%wjoWFU$ zypr6qH(WTyqq=2pdDa;L3pMFo*YY2Zs7Ze~n)brAW$)r|)R|u9p|MFrtA=>fqPo7!?}l5!J?ZE)#I9Y!;|D1`kb##ZctI`YdrioikmRNSRz9%Eg|8CiS=%&ozCOE_yjUWt|b(MYRFZKDn z_tD{#2B)+-=ig42owo1VF7tG{{MCPvr_1@s?}08|3pnzSgS9*lBXLW=ICD7;Vcvp#=Xgn zq|jmu(Pr>MiPDn1K)AsoJKrP&z>1=CZ(JRz0W&O}f;O1J+c8hu=TUy=^&1SI4`ZJP zmMMc>NF^Anc*j68R;?N{=9<9(W^ z$K=bo676%2Ck4}!yRk;=a7V9cq#Kasr7dz&5a{vR-%LU-Hx*Y?{Z5Y`vW78gHy(oc z#vF8L6;D6@Xirpo!K;qfmi4uM5!p{S*ibqUL)EXxsv}}9us*xF!20Yle`9tLMs3mV zqdi|l%3rDHH^wHF-{}+hp2PE0#IcNA{mpp`0WKh~4=n_IGj~+AJ&K`{r`BnD7DL6v zenr%N#5>;c`DLCfDmhw7tvq*BN}3Zzd6>xZ(X(D2th;EXm_40fgB?ZSD`n>!7aFAMrtYL*WbH5I#3(Y?Hp9GkH&s?a3(qjEIl z4Nf96>IqxLjh!7vHTS)fA1!BnIq%}E^J~{-&D@x^0~z8^FK3f~I0F1H20IN~odt9L z3(=8J>h&+I`KBIzSq$Y38GuH5fJRYG&-4I|Zirg9d&fI$LZgGV1exNhbU(3rkq|>T zn0vw<=5mOkULi|hGD7$TXN0i6YAm{Bok-U4Is2eR(is-D`n#^dgJySDNR=nTgZ`dn z&SGe%dL1&md|6bG4|;&1FWu2JbKOA-#V*ggubcky-L(CJ`bX?93Pv?u1K!KH@|yS3 zbj^r)oc0#)uVHoPLd}@a6Vu0+Xs-)@FNUuu>)y??ld(TeCi67%iN^JH@;r;*_r>y) zsQ=O<~Lm$%4AXb+CS1-c8+KTxif4n8)nRlyM?|Szn2c{f<+SmLSsnZ#+O1 zyibmqzv9Z>CsYfu3jI9AE7eKWc}cF9n7PzyER$}quiZs*FYF!7C|Pg0kw8-2BVq5< z7U361xs&SBg+qT&qR;R?g%KNZQ>u2qDI6S5u4)=^OX+M;yhH?el!v+c=YVgzJoM3r z(I3meP%7`2#bReFsMGGOc*FDY+;TDo>x6;ln#}4ObnE4CM7`VuPpw8f+RfZ5R;?GD z(Vfz#K&U_Y_$5RuI(=qge_xNIaYdg`iV3ssUgw<{hRL1I6h&T!WqaTU(s#TmI|OG) zCz~jvfbXwmD!+f~Wb)-xyG=uApc=9xd(u$?-NlSdm^_>T0QZ$8|FQ>2qmd~kzrx7jJ;f9m+7-P{Ih3QWlX3G>0F_|T8S2>LFm(Mco$&WTX zmW#TI{fu@lk%AEy_xarTD@y*$E}wGY+dAKeg_}3O6;Oh)@AeGgE0o+P_J#?A*y+S- zim&=g5mmK$z4^}RcL3uc_Y#5M!h+rHI~%|nG|gwsm&D9M*Lb5*`02vIUDGNhT8gU& zcl|PJbP7_26?Su4l2AR5ZAd$47bNna2sTKOCE=cBVzR?z8hT zMN1A(ESYOS+)wa-MuE6{P4MN1SSB3;91VkFnPsK{pNGda72SwQc|^-YmKF*9*lmzghBO z5=fGKvm|u>p=IAq&)>Pz=Ymh7My&Jdk&Xh`V?kpK^fr@>_%3;*@?Hp(XW}K4;sm`^7#3xOFZ~9tRkvUlcsYZA*MKf=%|K0;U0< z>;*#RmV*k+bu04sj{4VF*3<4W0T!p2jqdljYT0kUSHM!L#?U!Gnh`)Z)o88#NY3nd zQ}(01KcaE_t4Q2iLYhEN-sDvP24w%p#pxyIH5_@99bhK(R7aVP~;vUhlbIf*@Vx2Ik=o(;r2b$ao^ zAa}74IXWT9xQXgjVinv(=krjNRV{+#{Uwq?d+h5R!Y}X7TTOZRtt|VYlWi&REt-;G z8PP`{EWEXz#3U@03x-rpJ)*||SC1hs`!WN$@(qxNdGAzNx=A=Ijd;)MNR^xY32&QU z?F!KFnbq>zkKAF&U0PQiwI_=btsKT5dZtXu3os6)G+q7IU~-Plaq?*MHFw|M@hRQI#*3lQ_H|Cq_K9j$XuRBGvJ zcBNgzl*B0Oz)=O?z!1Q6$78u7BMRS?RUPVLsLD=s3^W()+k_)i*a5d%zfQa7hs80s zRMt{48f!nanwGygzJDT*pav4NPkEb)X4&Ujk!*jTQf=?prDGYONtTq2}AD8Uk6tQ zYXy^(d_0w=rl$@}2VH*z!?do~Kz)`()aIdW)5;8NiB4!8|zpefih$ zqTxqh^y^>o6^p(<6IPy`8<}-eHEL!P=RSMEdZOtXvI)P~eJkhoBD_z~; zGk=C8|8m?SWGx0|4i>|@W_biW{ywE3i?6eM2lU!-#b>*|q2trZGtT^iw(mE&$;XA7 ziKgqwri>+nuRJhH+g=~+&`u@4FuY6WwT^+OE!U9BWQ%J-kc{Natj5${>9+1$nK^@Y zior7X`v+c_$~)AJzhCIg$XgldtP7p9G}bor%C^+dzr>Akq(ghf?GP}7?n^7l7p@jbR_3$} z98igP&uJl$u+8Q2RaNx1{Md_EiNyq(m@_|-Q*J~RYPEMTJg(VU;9lW0Q(eGLy zhD`iBckO|>4-I&~w7=QEXX#D6^3NW`b%XBrDnhk%ms9w$@w0wFGJ=U~P|o$X~;3cknC{RGsXSU_(> zPHvxM4C(0?xGrG%v}eAick#UYSNv^ACIOMqLO_taR`UZdLA14j?PYmpyW3FH5%jh4 zhA~3RF42DO^9P_poc+UUKeI`nMIilbQ>!wQ-K@^s#~Ft>JUU;eDs=_83wPp*wQ*35 zH+Y62j$&Xenl5nn4}VUQzKzx@Z?LTS$INML#-f|etzL?=MSOot$cyT@+tuz?6sqI8 zmx}XMPx;9t^<~H9JspF6KS*rKeqBZB$XpKO5oE*ihJUGQFt);K**mcc)T(5ZDdG!e9hhNFB z>w!uqg_>u77!$VSsI&4a;9XMTup(32G@+y%OwkFgqCd_SWaq#_Fl*44J!0B({MiFb zR424qr5KKb)#xer>)f~**9Zxxf!a+QFfzI<;Bso zWL&yRv(eK{9I{i0P}Y)c+*{85*=`ka-(FZan2tsdGW1jP6s5)=y4?IM{wWCSIL23v z){1Wzb(Q<=qo-*_c&ro?9t-$rgW?;<5%Vjd0!Oqrdxk5`{Z0AO#lxtlw%h5qC=%la+r8uu zn;+R7Go*N%EcwQ-H^MC?)F}u48;VU;RlIFLb#iiU>|$7~Z@R7=zP|j`*{TZ9zzGQy zmR@T7o<&N{>$&tSrs%^C8-SV>?do9Xw3eEAJWt$SN9bXLhS}f8*4a>}JlbrUdEuU~l7)W! z&Vh`B1Ar6aC#S7&^vV4SFMJhKzh>0vMy!R|urvK9x^LWhjc>NxSHY$*GPzA%9&_v9 z`@o_vnS2^;3%r}8WIq6{G_dW2aE)gryePQdba||o3XDI z2BtaQ{@NF~R0~2ccRbvu)p$HWy5pwNio^WdVdZBYwqRRp#DPZ|s>;jz*Yk_PO0e+I z#yLenSblfit3y(ZX@_=s)4CM7-Z+tZb(0K*(|pZHQy}D4unhLfvoXDA9^7spOA0!6 ziMFOGj({z3T`ub&g-xVV@10FGM%{TnZd$K!3FX@YI+GeN|0er!3Da~Kav{u(Bk;9h zC%zISU89TH|jdnhvEICNw)NOFT>)sv^u>N zcL;4}>qjm4s6ubEU>Em-R`Ya1ag00L1&O2_ua7SZ0i?YMVx=b*HY;fIV?&woeH7oR`-?8KZnZCgI>)SN3${(C;RjAa5{t~mujAlW?yUg5_20IJpbjYN&S?wE0peUGqq97-z!! ze-6vP<&yZZvSc~tI+ZeSr1y;m#TUrz;m$!^C&nTa#~>S4t1A+mCLBUBzIPas3ZMe8G%9_Cu(40hp z73X^uJs8<JtDg+kGvDP&pnJ+b3#U1U>lf}j zuC4%G(?52TlkMl(@ijgtCmFj3DqFzhJ*RH0sCG8V)MuvMGHZ?=)P7$VALyR5%#bC8 zp&HLDrBp2whWF^{S~OQ0*NzWR%3rlubZL~T;7Sv5sWVCwk(t{>nv#t!ScD1Sz1v@A zmM0({PdmutKD+k-KJR}V=w4E9zBJpL<#y*~&A|FSE?Ag0jEoH!rDaLVc&tjx#ntH@ zfg#K@+hQ_;DSyqDG{)Ai$$p4LnrxkZO-e=7X#}*~HV9ZgeT#ex@z$^D6s7Lkne~en zxj&wye_oUkr4m{iZ|QKmn@rFRO-S@slT9>wVG zaYXxfPFUY4K9LQVu=BeGfq!TzU86+0xyGrtlXYFoVoLqg7^NlMr_SlsFM+9>Hk%sa z-IL%n#VCzl*$3#}{yYJJ8o>KV2Zz0TEXr)-$Kg6OxZ^4h2Jq6hYf#50eyOZRVUhK*hI;qFC60XyqGT` ztJdST`bpPJs=AqmZ^I?JyS4ANnb7D`wclGZA?w^_PHj457LpW3u{dy4@{rveUBOYo zvlXvaSj9ls)g<#kIriMHqC6_Joy40Z?ER<7eA)4B!tleBW0RG}Crgb#N7>UTbRP*l zByc^yHC|Ff?IL-NMzd^vRZ4y`tf;z=M!(!G%psmD=N8>^ZwHG%2M1B9`6%i z)ZZ?}?W}RxBY4j|r04mR-m~`V^!h0?n=q;UYcOzl@@`(##C44*=iP?ZuMXb#mU{BU z=vQUEY~KgL@^NZ~nKc}jy?XA&9Hd7kd1IsWJTwQgHO%iAv6;oTKA3*6H}c-FNmWtF zRZhpk^cqP-*rSUVIE9;eb$_WWb3(7elu=Fv-g`Qg<7)3eoVh5E4{*N#32c#yX;blh zWUIxwZuu4pzIaG8F5Mok)mth~{xpBGr+MX(!v*QviodKI@|zBrU62l&o(L7Ep+%+M zpEhj~-OCwS$+T3!HH29WJIx=jSE9=}OdkvkpSlK2>&&&arSnWkrU<_=P`!A83#|Ov zjZK!$6|Vfo+11*@4fp2kN>pHcu=rze%+khH3<&za6 zMmOzb{EUimrwn(ZyZuV#ju%`pRHGSRc^&%~KT`d?pqlLq>Zxw>&(-xCRJ$BKQQ}y= zF-`|6&r1XOeyz;50~&Y4-!M+SD3;*pty;5$Ydc+?QLP&FM(#BQ#;Fp)tNV(|&;O!Y zyFNLaypWn(lWLcrCnNrV<07BNOF!8ME#2F)X{6~Z(yt5)eBq_&eeh%Mg@^K!Lz6kz zI^~7#8=A6{|3sVqVmhc_?tAKUa3a&mx|v~FEZJXRr`Da3x-X6SE-nD3_{ah3-3?00 z8W%+0i~H6o(pedUvWA|D-pu%%4T%YhM9puD;RgG=EuiKqJw-*XG2FnhFp)e{)fAHu zbB*)#GPSb0H|^#5b;P2i#4{{QhLNNu=%|*;_?f;;!V{?*5($VJlU&KY~6)p zO9cSnEB;UrIJRVQe5jLWx6g^|x%iMK?IcWM*Q3ac+ROa-iJG`t2<(%1uOc)o+Ceq3 z+3?U071#5G_=fzWW5usRgCiw+_>%HdOj(!n^F4b!6H`_Y)7qLQ|Iq4R31OXhQwnd8 zADgqbrpl)omue-hX(QaJ(-);m!yEMQc2eTskgId+;BZ3h8^_e)sKF!yCBhqd_jt~S zeSagSHr*G|dbK7Qv>iJt)PB6B+QWR4m332@wv3iV(04NFmkudBVV^Gj{!)Bz{=rL) z=X9xA@Ddi5NbL{Gn)_4m!jLZtlhA*V&_z?>jNhlA&-ZsC>b*~bNBQ{<{`(tDB#mNwMQCkVa{9X@N5H51G;)6FSFg=tU*&DG1nb}hw`0|k+&r-zLDJKjaahBt0gBN(T|<|;*#b2#C^>m>iJ zdIY(oVT~8F@of1nOrW`XrQ4K-=!=5!C8dlx!hCL+@oGsPyEB|T%x|$=lSz^h%-+ z_Y+|V53*={QgFgeIR5VF2)B(#TO-|fT1A59Drp7OnB{d}DSFAjuVDw1k1O-kr($ga z6lVZ?;! ze&hQpzzz>p{SJR;0??f>Q<-{ddHw5g8;NQ4#CL=mr`{sfCmGM>`0);K>=FG7UI6w8 zefLnFAOj4cdqee@cb-n8z%EDrja|->=$?tUOz2J+ zs7%FMUY~xkiLa#F>`6Fdm|L-j;mQWDhC4RHlU4Dy?uKBYF~P;`J@(gYe8N>Byj#}9 z@u9Ygb!y2 z<;;8Fj|i12#f6b!5gFy7TGXNC)_bFuB50({$1+Vae6#n7>ih8L{N-LYf^|fH!dRtC zhNVMak)KephPOJv!zsU;9iUe>C+b2;S`jAO4z(Y9ws^b4wrRRk4q-xzWh3IS_8IL_ ziWLAwuYc{u_Gq>1mN1V@TpHi5`%}YQNkA6x2%7OwjsWTQea}Q;!ts;|cuM`$Z~>6M z(Ui94Ac0PJkP5xd=D?-7a3PL!>TxTg|fw50}r|&dRRbMVR9EQ$R zwC}1a#`5=cYv3zyKG&vie3O?>gbM`Qr@oTa&l$Cl_gbHE1?|-bdrKpSjvU>gUiMJP zZghmF=d*@X=^KJcLzlFVkLGaMlMD`X8mY3F+xzy?_?_@OKV7wr^KkF*jw~&`wAj-`n)*L`lKi8miht761hTA)-bBX$e3ucwGt9%CI(h#48k>=Oa`L+^^0y&G zkJ#|Ss$v{#&p5KQ*mcEx=mAZlTjTH`-@^&}52i=xCTBMvcpr|Qb`9`8_WnH)v7Wbe zbtg9vfl&V^mKF^UYThmnJ=4rqtVOJjwToOBC0MoulyICgBf0{^sL{JZe`B?s^VuiL zLn~$b8b*|<^d}ivBBj5m>w=|v85<1)BHOxitdDkN&!r26el?= ztNz;+Ndm!b;49V$4>xG8(i(YibPPA~98F2I{p3(4JSYqiPp4`dlt(eoSGT(2t?h}< zkJR!jcEg;LZR7NX75+zp=IZSRWVVNE1O2j$*-n4usHF!qST-W_iOp4#$3Vs6<#b8k z;9O`PvR1c`-n4%dpw^STH)G#y3Ekm6SCzM2rG9r=i4ma@{=ajT7E|(Ldo+>de)BRt zni>SHQ>?`|iBm*9$@gIy{|ADJ@9J(2zFr2u07ia~Q86)Db1G#c%Y z9zLVJ!I5AZg`Zl%I+(CNWAQ)0x-OK}$)g34Vc`ZVWS8h#@!oj2drSe;t;&1j93DJ_ zX0v!b-G8R=iI*XhiK{`GACchEfPbLRRf}c*#}Xg@;3$U&G_aF#AnFLnR5-EX1~M^C zW&Hy(g}E>&^5T0^wyRY+AXAys{SuoN=2$kYSba1I#W+GxpyR7W zvs8rBo2pktmusfzZ;;@F_dYQmU)}}0F$I=+VDSk9Yf6h~4z(+3UIaGGs^S1(IYpT; z`11a~obJ4|vYe`}zL!$f+VTXHwOe0+))u^3JhRSaMdKXg?cHPpRx3m_JT5Vma}F&A zc>BP!vH839O#Mr&7#ih;MA zB90z68D1B?Cx<{4uRo~b1*nowa1eeH?KxK_ziW8iwcRW0n9bGiFwX&+tJEiX$+0(k z^)7ggk~X)BYr9GaO|$%9%4+k$2gPY!a^V~-TcJVmvh`rWll=Wdk$ zm`(6Bf2IR;Jki1BY2BarWkEm$_=s$B1E+{;iL2qj%)O&v=CN>YzQu20+o3eOm6_+* z-*_orF?}bfX9EGG@xM?;6>fLSZ`U5#$UFw|WNx{lR`q1uCbuBv~JW_6|HS32aU zL^BiePa{dTW^Y$1RQdT4gW%7na$}8?Ud7)dz`YrYnji}R`9X8FBnt1A2Y)_np=0oc znVDeCB-z@mWW;#z%~ih9gZxNN@aK3x#X_BmuxhjjFno73L36bv5=I5RYuRyxQ1lCo zkd(uwzrW3^IEvN6*|2_Kc!4`L{s0L)$meX^uo5&BzDu=AZc)R8cLkkkl+$Q*!&gM! z8Ri;ZUvPW{7a6T7uI*d>@>Ou0_Sz-uyfG6cf@KX>)SZu3Kn>qqEzk?|@W*+*dYuo9 zg#st$y@X)XGVJ%I88lZZ(C?z=;5!SPx_~3o(%bxr7@5O-N67F-%&OOo;e@5^#(7D* zSw?j`RS$w7%8i`;zQ%**>fDc$kHUlM8`irfc?uEYs-D9Q>z{m|8HhlxdS)Ph2;Vs) z$_38%z(>)*G#jDs^NIw`RSFP@qCwdm7rtw1<9e;*v@4NRR|`4XbE}}Cy z%EdibWH=vZIDge)#aGFH7;`Ride}KDW5_BS-YR7A(Po_&zn+U<`)Kd(vRpYENe}5xuzLTx0yhCx7>_8F-{gUCe&mI+ zy!kNVbQ;c~rang4nZUGYP8 z#VCh8$#;lJz>QMwF0?-=FrKikpg80Cr%8!e2v@zKGU{0`q5@W7lc;yag#Ar>CpInc zci{br|GP;dLvT;>?rlx6y^Y}PXU|ey*$;23-sR7$!Mc0-K9q4?j|T*9kRy%2#m@YQ zmOV!SgmA&q1cLjKPe6DK*=11?p+Q3+M4d1FRjn9cYVNnew_@KogB5E(1DAz@w@k@ za2%R7HN zw6^8@JtJn|p7^^hIK?=PT+Ml4nbDXQ+i%j&*jTLkaJiKx#bNy&#QWv?k2?0yWo#2K zHSSoiteIM45Ca6iF2p*8@Hz+!wwax$eEbRiQccqwD=<+lo& zR4?`EQoZil`?J|mntLi|?8$w5xr4e}f8&Jbwf~$-KT-tlg27IEt8W zAvk)T&d4m=fvp7BfIBp+e>BxCBxCdCa%N51@tM6cQ`8-sBK1Vg@1w*lrAy6c9KzfpnaBJSB4Cc1CTACZj_5W%vyc{C& zYMXMl{>Bl=94G?Ijn)m2_|^#z4SsNIRQEq_`}n`JI8XDKCPePJ*ZD1v zTOI|26GgGzpTj^m9kwwG-hU>8$9x8bco}!c7Hz%5<{pz7l(uC89du~q<{Z?z-#fUt zIQ|S=VS>n*T-EC@Ai(V?D>s$^xk{Nqo%QOv<0_+5h0t5g%R_1BrRZ0#ECEdLVwb8< zuZ&!nfGJkLLkXxl{f9{5uPkKIXEOKZ&)AV$YTH2}rN3*!+e_iT(#m};1c_oDX&+E_ zT8QN``pgoZT>Kwg)RQs)3$d2tI>k-AyYLStCJ~tUHLbR}?>|H`gH8PHnT`#S`n2X= zw=!65->P&_6@uFj_cIZ%ZP}lKmq_@8B!bo_rQ0E3E8(QUVu9s|3j2)qmUhUTyItad0rJS{!5TD2QU@>v)WSivolnr@L}54 z71mc`0$ow#&W$FC4|&pvulx;`lQIqEyCz7`rIMi~ti56^)J`uF`BUy@m0l0o5egVK>i<)d)Xr(ABLo|ASi{igtgU)_Hp zfDFN9H$M)4O*(4e^eC5~k)gF4 zSsK~N&>L8X8_tw;$^CV#$7l~D1L#Ht#p4j<$PSR+Rx)G<+_;xchV1A9*&$=a!5L64 zza&F;cCj?-k|8??AUkGc$j*D}ISn#kT$zmC)AEm zZy>>H)FpHJC^DzNd=StbZ!k8{Z6d*Dfy?6Q4oqG^L{cn1WB{OhBXIrz5&yBxK4Tey zlogM&>~Jd~$L=Vno>L}616jZukO96(U^O+90lwaJqmg8QuY~z=BpC~L2{77{$N*nD zmPQFO!1vd&9vFSNObVAu>bYxV$c~hF+%!3|1KyyW4B7Fg8!aS5cI<%ckg;%=0HggC z8M4F5(r8D9>`VjLxJmlL{p(l{jJ^P1^lcQ6V<$s)V8CH$Btv%Y(T)0$Av+A_$6;jP zjw^5&;>nO5N|r_jGGvDx1UkrZ7~WFPog@P`ei`fWp*~l@Ip8p~kRdw{=th&tkR4U< z24vulD{vT6$dDZ-mPS=FWG5EL4ml3PJL)-gGGvEGJT8_T*!X3vheDU|@jVcrBPYTJ zLSzVXa0l2shj^D0vd@U zKHLCJL${7YXes_#7&=*LFG-t8CZBPH;60$&xXdqCP%u_wX6sk5vE_pdVEF=>?8W04UH3w zKIB?fgrp60gebwUV?8kXz5=7~e>F5tH2T)EB4ikSzl`-Dqt*b{tpC~2IM~Y%auRD< z5z_bV{xa4R$~i!A@qaZmPTcgpmK7m=*Y&SsJ;sSvm zYUyCbT?@^V5}F6`72x9hua-*?!UMmI@gTU;08r!KS}?Gd75R0n$7j?)a0T%%Ef`qK ziu@ziVgaVy-0smWyHk939%ldM&I&J1^TP1re-J9W2_V;{8JL*tI-LG z4`Mk93DkqT5Xwo2^%O%H5`QYlUsWmhG$C)ZQVp|r!TX;U@Xitv7sPUq(DJ@Nohk6w z#q|GGKMaQv%0WnDe*b@Lbz#@dAmRPNo^E0lDhUekXS2%Lxs(Li{k;lxY0;eo<^j88 zrTq9S6$zsIhdn(&O9Jme2np=(!|zTcN$>wCKMoKiMQ?xKVr4Hmobq_{gpB%lBrKj*paMwD`iZiD&9&N6UmB4EMp>B@qQWW0qnt@ zLDGO&2t+dVS5jW2QlA050oagFD)mwQN+A%bipNeY1R_=OzGpj0RlJSF8Zc57 z@7J*&z}^S|ot07=QmG$HETtit`YWY0q*8w+X+$#hiKR3oE8a>K6{(81k}o7#@rYGa zBrD!8V?7@BfVGDpX52`o{z@?lsni!F)*+EhePYIqWa@+XD>;_FF0l@YWW`&lLn2l2 zR_c&QRlHxvdH{PU0DCKkT#*WUNMa=q$<$w|+i6WKyE9XR!O#PL#52=a= zBNoGutavL&gpsOv48$YCNL9RF$9e#J(*X8XPFfdB*&_Q z4U*$qq^GmivKqkTSj%dVVRDe3&|1rCfOO(oR)h3ZGU*AewX6n!y|t_c8L&rsLTfFn z0g`!ZSq;)*FP7wl)>>8rz}{L`gACXsJ)yOh)c`q#wX6o|ut$1AYb~n*U~es}K?dxR zp3qv$YJha&T2_N}*dslmh0kh0Ygvu8tj1bagAC|j%WA}sn$6Y)g*IgD+Fi?P;BQSK zIiI$c)gVLb*RmS;D`!Ym{I#qG83l4{Sq=Q9EhNL&EeT z#?SlzbkDUur6bq__=0ZK+1|?tf6284{(9r7mD|dl-p2e_f%@9;|34vqd4N#~t9Tr! zumv~ukuE%-Mip3XBn!{l@c&BUV>E}+0C_;17F>2mvhaW+RbaM}F1u^P{~L)9fX{WW zcpRv)1y== zemR4YD+YsEHv5yp&BkW|v2;HcLVzsp8@r*5@ z<(oU`E|>9kuwE`_)}$TRW9VS|uS2cmxZa(9zFm&r)8KxBcS3Etk4OVcV|r+?L!X=8 z9zLHP87%nYxTI3O#WHrbm9k~A{=F>GB_%EuttD(WF1DCxJgt%TAN-rXGK)hm4-8CIgG!0dx1d4658R@eX=$pwq5+ zwM{u&f8z*b4iwR4An$o{$48PmK8(!y!^j%nm2Y+^gQ8fE((xm;jcidF2@GIhX`~g8 z+jZ;sNcmwtkD-k9wjLoFn{9nsGpO6jj&)Ejc+O`~h?jA9Y|+*`Z0<3cah~SRHeRpu zwDG(5r-0+s)`tI=62HGv1OZGxL6E31r98&2qfY{Q_<$37K^NpKzwUISzT$DS{X0TS ztu!eLOBFP!3d_wjDR1htPEa_NId-gL(PuLE=FixXTWYKM-1E(*5V_}G=eIm=c@*pb z-W}ZY{FICZY;F3#i2HcYLk67b28tkB$-q7k@6*kph-OG9W$^^@njI{S8f0Ln3y2q9 zVrg8O*<7P{G}WzFk1N%^S6?jkUQP!6f}4!KjJca%290?6&W_F9dQyBB<*s@vaJ0xB z^gd^Hu3CC+`oE6*>@^r$03XCd@kn+)EI}7H$Uslxv2>(6FT`9W>FBvOeR2Y}WN;rA zy5!j5rjtogY(|Fo0Q7oE#^Sj){J)a;GlmhCz;XkdL?X!$o<86?kOO^d!~ZLZ4}j0L z!>tbh-%T=r51ffvNDledhW|Gb9{?Xa06wry#D@&wkp;&?8$I2ALQ9P+IVPX_S)&k}#;WJD|sLeY(er8kSfbJ(ljkrZ!RvN{OT1Xwe9kh9oC zLcDHi==`t)<#KBv$XRS9C0IR9X0|1d%xp_Lna`6uK8noo1IT>7fvo4*Yn+do9|sXv zo!4YU>_EWyG#L@Mwc-Dj#9z#;6c-&fT25ICwsW!Y;7(;Sd5CFbPu)kxiHiHb{TdPbVO>^3I!qr0E|FlGdrv4m!PVAtSKG7=6$55O14 z5!hxV?kfy~Lk__)XgGw1VaF_?a>UXYI}V9}%8|~~<3ly7oneBo_mvF@-9X9$&PDAVzKPFe)bY*7T2i?$HwB4 zFyqtuP$yz4T3ec3FKES2#S7JZ%lSQM#PS@>wZWfa=nK)YoR!CGFyEP$m0pC9D8DQHe?Gy8{IwhIMr? z;fPl4aX3a8ZqMYh^tlp42U~V^#r7gxmvB7QC+DX{2pV>E{6YbAaZyz)?OGf z1XvNKTCW>}83}+EtYmQ_2=S_oV-4(x$&uzfO9Z+dsRJ)?g}yFNqOIYOumF++y?`s6 z=tdzw!O@G^x@7^e8ORcBMf#@^XnC_ME*;;9(3ly>d&LfOL0~Z~@R8-3B2V@beHUz} zV1M4S>wK644Gd@33Z+M8SKS$)emZl>hEf9Rl+%k74Ro`ACc0r}zqiMRN4rW~Uvxdw zD5uahOxSi$Pkbl8bfz!6?|XyHTkY&+&kxRra~vr>w20e!rh+@COS#{;D?M-g#!Trv z^~uQhdvq+{KhqfD56!(fGcPOUxUCPilrHh{Yzyvn%#v*+9hV8Ptp9UNC_LI*OiGzRp^r`h0mPX zULvD^Ym1!oMd`SowW5_;-idikY1U@M*`D<*{XP59xV8Z``0;1cRiJ5`HiC2WPMZ%q z>BwtjH_DJEt@la+Zt7uGDqUmGIUCyGQS$Lo`}k)Y>n)~sJ<WS*WI__ad1IyK=sbPn@-~*`8Uze-+e01&FfFF zxy8Oq+5Jhrb`kXs_Qd${)?Itt{5e~C8M%&EIM@X@7;Y|9Z+Tp`OYs}}WZ;n#vSG-? zJLm4eKYVMJo{Y^3di27_>IUD@>Ro{+ucuKf8b-`#W=q?(iR2~h+&Gf6i7i2U*WgIk zF*8NeSGs3h?)x?sDvswFRDW*ck#zB_xrv3nwDo)REm?e^OR4MXfeZOZ9prB@Z>{jI z2}#r(N2%(+-+xYQ_FH@BqpQk@`^RLOG+#VTt-k2`lygX3`huu9%7lAUJDc(T`|WJu`>s)0?ElT##oPDPg~pBQ7v~<|H#ozt#6hhiRi*T~ zkv7DBPA!}>ZWr%^(L|94j}sYB)+AN#(dMPN+K|+EPawp;ao%74c$nhxcJ)~5YXTJ4 z8unIu2!y%4G7%U$5vKT1!1|D-O$6ueYr|@#qiPR68VT%pC=jypE6phNuo{I;eu7-t zRo+_rMao_Ew(oMH#)(nd7WZF9lZ^#u`W75JaXI&-nhjYFVwB_;##P1N8N zwZMt%2Omy7{P33RexcXL=xuiS8}8%@6^J^ADQ3LfamEf$xZX1Ex5{q|gM-S6#oKU$MJ6sOtKod}`UNqbUaKhZO>LfNqT}`fr;{X^4-}kK_u5h`cMEEQ+TX zsSddR3I9`J&*vH2zQ(tahh->_4b+Owj3|uMu$a7}7>TGqv$L;C^SA`F7jw_ovnsb2(lZiEq9q z+I!_0Gt-sR1_oc-sSYnHwY>Cbb$)YDtJUOb)YDcM@l%(V;&TLcr7dK0WPJ&ECiH9@ za_beU4;Mavyl;8`#RJLp@3x(#Wvj1uYIv%89=nL?Zm)@j=7QmhMmym{SuMam7^*KOLgX`PR)?3HzY`gZ`d?ac-4EUj)@n;IF} zSPSY}8JSxP5`H-8Nm;3wA9+|M{N^&fKbtzVj_%6jMML`d zMlCb!x_(V{qmCp6)eje`a#O5oi&H&4i$7hbNBJ6+9+JY1wky0!$O=^QR@M;9ago!^ zY4eF}4S>`5y_qg_b-M2_wvDIGUT9nLYpc=SQ4jm|+m0r-YWkN}ZD&(@cPOPoWZS{R z28z!IH)sl%CWLIzw&V(m-vQmZ=$=*>Sk*}Dk&^LVt4vDZsr!w`CJr9OHp8DizC)f1iQ;%@ZWHXhx)Xu0#xAH5M z#+B=(PM$qvTdZ_XxrfSFt3dKzkwxhq^M~{PpDsuy%<5?@-ZA6!;gB@Fw8i$?em@P0 z-1~v=;R723B(K!SxqRBFjLO`30v(QGI&ar;f+w>rsh|=TVKX%FzR^5*JGXh-$hg85 zk=N-8XPvOub*f|A_0o?S@Ry(-@vTcNXIgX(HdIX8tA1ms0~e)QA^foG29sIJ)Wk`f z#cx!joyv0vAp`%qoktf=Wbc)-uM@5ksHDeQwPbNmyjMvz!U>G9I{EUn9nhDZF?6Ni zXlo9X9cI;L*}51ZXCQNNloB?q@p_9>VXcr|&6eyZ0_7?Xu7|hU>{+Of(cj#^MSG)3 zhZSGBKTb_aYrWuJWu9iynt`(x=Eb2_RuLyF-_on7nF}apo}AsDts;CHM%5qeag%F7 zIS=>1RThrxu6b`|;p2j~|7xl-ns7VNz+5n4caY=3iea|j&IWz+HQgrl7G_YI&4dYm zApcuth`{?O;ZK?y-xyBZf8413D#I3aXSC;2w4>=Ux(w-K5;tK-!+dF7)XP*BnQk6{ zu`iz3!F01*0X3^*KyAvkU?wQ6{W+|o^FE^}kEX%M21TV4>IUNxj6o`j=Hgs!Q`Z3n z7@0D~r)Gtx!$lryM$#0#lj)k8;zrbVDYjHPRwnQmOh%0x_9Y8eJZ*nF|K1J{GPxOX zHrqF>TX)EM-QR%Bp8o?f1b7h^!sAO+?|9%qMZ^^Pa0lvBBg#muVbF7O#{&pTovfMbUcuDBrxv&;@2Tu5$^S{!Q!AF(5_z!yU=kLx1P0je-p^mr^BSD73u3kkxZ zr7-aE3xJ z26h;Bt~)Fm^KHz>5{{O}=t2W%IK~XMFo3vj2Xlpb1!2(gEE0~MwSz(S$mWr4&Zzlh zxC?45fPyue0=sza!+lrGLKrmL0LKJ06k;kzE@0B9;fuID2xoY8zydd$u8W-wi^WZr z1VF;{1E^cL$=R>aBn*xz-3i^yp<~IrTHD;tV=@P6P2!-*8}t3+t<~MF3);my`^%RX z3h$`GyeEw@4|=@1e!&|9hOi?iRErx+}BCfSlnEC zH%u1doPMx4y#!yH9DxVN;&9rSF&}o^@}<|fFRDmaR5uD*8pC!Y2fhL}P3FbIF@_u9 zgTr|Z3n=hbaKLM{sVjD_JbBtR_66$J6k5|o0E>Vx&7lM#OeMS2vU9MY)0Lju)XF+n zXar_l3As2k_)FZ{?ZD#igK;c6H4E=nMAfm+LbCy%3gNhAhnJYk!4ekZc-OQ(1wT0HVjWUCJ>U7R7WvoEhx#ZVhsDlb>IMJd}h z>x(0Fjonko+~b-@k=LSLULl>jkDV28qDp>b6NCiCkw?8*Gs zhFG5w$Q;H#fnuITn`5z+D2F4l*!BioEF3)(mJZFLuzfe5I@KAAzPyqzmf72I<8rp` zO~$Tl308Di}Q3o3)EMU&A`-iHElO`MQs3 zhbAA%)|#nU)V)lL&`k_M8KUo>?rWH&^DScUDdc~mI}?HmDr{7>7{ZRe()}%0m+@O+ z&ne!=S_#{3oIdtg=lWLRGl$fE3t>z|o6EX{kFq2x9g1ykkDZnFc9h|^Q&zV_l}1{9 zl#7rU|Li4V`I$>Sg7xOIS8lh%OmVo2p+t8;q>=sG@@f{>R~wx_Mn{KiPE;FfZPHH& z2(>*>>=HlkY@A-auNWzzt?X1V`t_B9M502{MP1Sq=@Syx z>72^^jKk@e@AmyeyN;@$9kBaj(-+tU5rqv9$^>eCf4CEivwi1u>t6Pwj!z7A@Eebr zimT=Sngkc+dHkw^za2fA+3BCz`QOsZ>SoEqdXkkiYeo zdlO@PYWIVsXu$vN`<4qnvu88hbn2BzOyoH(HQyuq)6VfU`EJ=?aqzT4rrOhB-mwPc zb%mvyHL*5s6Tf z<>Arw5!T%p{+OK}CzVFYHS!733?@f)IR1cH2|dNqv2!J+$S3KUX0>6&nK@4u?P_f= zpLNdX3Kx_N9rQKBIJ3%q<4Sg9N;zfr_)Nl%u~UwZPrTcmc<#_;gXE_0 z@gu|Ib3XPY@~XM349 zSRqkEFlg zQoIyXpm@R(;my?}W_}m6(4~V}e(XvDv#|7RqXu^xr)IrZV&QL`=(q#q+z)M(JiJ3; z$V|BzozaIby}EHjb6US%(@>zE+T#sOXJ3^DTbKN3YNrWPD~-CWr@^8XxV{v_qLXRBD*oT5I6it$B&j zu~GQ950`K}0lC%a*{M&Jfz_Yp8U0f-d(8OmpqLfe-d6=A?){W{@nDGEH(fz&-h4W$ zpfc0urevs1K4<7f&dhg@Z}JUASt^96rL`Q)QHWMcKXPyn<<5KW^=LFVQ>%Zxu9t6U z!Iyk#q?KN$|1vHz%{0CidTWLM))Xp3%RQm&kw4oYJ#%8xgr4!s^Qzc4B0=#;TEemq4>-HATIGm)eaRCH3~N1)V}=d5e3; zs*XLIz*_OxMPI16tNtR`Eb&arr7yvbi6^RdXKdo5R(z`_6fVF`S;J~wE}D~;sbDauLvr-1EbT7oAx=r3uAj?E*PY z!zvB#RnHzZD9;l)1&CoT}}_59e0DH{IJ~Pg8`) zX~x=&`n@tEk!pz-4~r?JsU^1@rc%Cjq=$v-F)-qd`l#DW0fSis%4*ywzQSCjU19?hCuPD2$ikMZv-_Y-r z=PmEDn){hj@h0a+&3o&7Qo)&3$VDKYWS$>RH}1$XDfKMAA(X>!!fNa5>2={lO=9lQ zK>$wCoZ&c;fn#y}l`sDTnp$%A{=oG3j)3ag^~}s-vS)9MZw#ujbrs4tpWeu%ZEz%< z!|&*L8hp6(*aZC++GmgS%nbe2;xE3+7d9Ce6n#a>Y+b}mZ+y-WOh~Al+4`pw5=yR! z66-yo@AODRsi3vI4LW04bRMWx2jjESE%`j2GK1z3+Zt%_GLe_%n7#?DB}GAbwQuIb z_OuVM9$*`6O6$K`cIBo($~h|sgit`(p81DA0w$*KzyxT>rrVDR3G@>_7A9+U8_RC^J^ zoOn4!{YwZnm*Ly}8N2x?6ifAZpKRf?tEC%m3C+eeao&ECF2+93Q0t`qVR$gOs)j2J zd@Yol3Y;vknplL@TJ5og`+8kCCqM+Ji;g+3_Z)cBwu##2QzL`&f%~w|wAfN~e@wAt zbyd#~mgl5susm1xY*CSs9M23XcQ_i$6)4*=vh0)TiNokyjn95BJ2 zxO_NYiTG8%>||<*fAosaJZk3PYro@Yr{K+rR&`hz?HdO+jZOnHhI3$LG&xJRj8A|3 z8DOA%W0sx78>jDlgB1k4sfI3dYAm4)yY;mF5&~_L?EKn>W0WAAL9_cpBmhL?*%G%W9aoUyFVK7kPXG$Ddosw@tS;xi$rCok^$q5#sIRwAdd09r$ z=$uKz87-bHWla-?fHFkp7hg8Q`p7ah@pZatxqxPL0?aCeBO1&qWy|=)PiK`9b<9b; z#c!Y?deci=oS)2_YD9Xax04wsz7Lig(I3S1qh+KwD<|46;Pu#B$_aCGfz)BBvKOYs z*gLbHX%9%wjMgz7RuTy0zK;hko&BI4jEPn9penS z!I#HelTi|rQfsmFR7whOJVi%sWV&@Ln9t>+Zi!r%dB!=N68A3ixt~LYcqHBY6LXBoi8J~}!eL7c@#n-ljGtwCiueub8188^ zE;m{piTQ3U86Jv#I7MkN)^?k(-{uJ3QtH|GUakJ8bTiB9?9o>434!GonrU7!uZfCO zOT$`j=gOV9!q*?iT=VsjI$wE#`5PsuBZx8zxRu{jz8!i9rByoh4yfw)FxPWk6R6_a zAuoW}*`q&QsZwT*J&Hwe2B)@P-YFPd^_0rC55F8*iZ^vVx>a_}(tbNo-=Yh^NnplR z!Q)29x#OlQUiNEx&-Lm(ekYPTeP$J+P}r%L{LuNqfmA-7gF%;QC+t7spEpm)HY^sn(cluUzLA=tosSb>e4gUayL5>{V5e| zdGfTr5%6}P_yB$ZBf*@q=@Nut6)i|_IMDc7;~Mq z$-ewRnBJG8$R7dfQv#sssrX4~e^KvTM6@2zwsqD7^pY3K96#+rW5isG<}hJLe>!?X zsC??h?-~@~vVhwU6;Je6$^wgzv0lqs{&Zjs+RFix8St}t`3rrVQ%|6S%+0Ur(?4J4GBol0oyU4ufrAbNaf~lm$py*Q9zbs|W*qKT>UP>)wxamMy zxDdx{^){^G_Nlj&05Hzjn$dMlNg8}>AC-$np31v8V)yY@d4b1mJLb;ls|Dt-O&-6e zIC*`3w@JqO)Tqw#4_#S4kHJ7$Hpl(=F3VrP)f)8Siv#j4Zw7NJ#m&-V8Eoe3M7@Rf zKcr!jlQQc4PL_m%i+6s?g|(K4U8wCcrXz z<@%ks%aW9m6?;#OPr|N1F?NQ%<+YBdqdISF4-oOa6nJHCvGHY94E5!Et$K8t zv~Bn1^(e!IJ-6vAg>UUTI&QqP%MU-dT9wH&-Dr>KBolFbaK$RQb>b!Cn63Gz%sIMX zqk_DvV^q1)9y|27Iu3W7&B&YVNWDJBS}mZbk?|Mv;HaYvVr;r7v`2sHsnp%%(5T6( z`aL7oVoQ6eYcNAu_VG%xUPnt``%v$3x%QDxR60pE^$u@jS-g|fA0zO;-ZG|m&%&Of z(7pFB7;^&`9{h;=VbvzXAl2!>T%wLb20hoTY;zG~8kG zLMeXNM_|Fyy3ss2gmymA{WsZy=CN~T*64U#F1=?BX$3Dq)CxN zI_3J_KHa_Ht$yrAZd_6mEFWvVUYAWIr0>i2aei`Cn!h;gDcfg46yXVyvYgF&!7jF` zn_f%vh|IvHz0eo+f-e~sKY)ta_XMaAO6m({?bR^KL%|p`jViD3c?Nn#%k#=jQ5d4c zRNspW?XXYZozI@f){h@Xs#y3TYnSwPN5gO_85*y?-Dk#Ll>a2U6dzsyv$e4cj&{D= z5Sm{X@(sfUP*9>xWifm?|Lg}B{fUy{&Q2=hjh0)U2_AGb+?{C9f6Q^@;?#_>uoLuZ z`@(j%l1$n+S89uguh?6L%_1^&TO;%->@5SxmlCm!y*?%3;&%pye*edBDd(G4&A zuQtsGYMkW_y!iQpSg6$x<68MEK?U`jl~XlZS?Ix-XAs|%QwS;}@fjpETU9Qvwru}^9x7H@(+C)Oc&_%-g%;IdVU zo$rtQlUTx#&yM9JO^o6M*fBhBfZ}Iay#-&#^Q`Z^_U_@Y*jd-?xLN5iEJ?oUMV{{k zUT(*z%dR#-kOXdA;1joq4qdX?Ah(Dn=MB2T2M=|g{3rl`Ap`(|+OREqvXi?@QZb*v zP_FIYfKk#L=b~w{Wm37x%-8rv??&5-4&~T{O93F1$8FX0Wis{Z8#&w)jO?chFqroa z!Fcw|eBa8=1iu7jdK*zdeXjhb`S; zZMcE?^r6XISbc0#C1986-DzOm`{RCO-Fp$NdulT?mrhGlwy43OfSQ#rv?1sD$VbO- zfoSN$J*+U8)4jk0Q6ay1sUsKf1@i0i*HLoK5>W>7jNQe+|x}S3TdH@{@?i$Yl z?P2A+aIS~dDmM|aH~YhRAl9u%?wFoiU=DOSe{KPH%ITvE$VTnO;>tHd#r0t#>DDy} z?EFjCiD&iv>E2M2&xIR(&(GnS5V{MMhjkqFe>BnAMglG$Os0N}EuMdiwXLbp{i=0v zR--jl~p0nkj5-jHa;JicAAvlAbbpB_Bh2(hKe43}@BKH||x)w0R^ zh)2gw45z!*43!OLnh58{KIIywv^Br=%lDowvc4cOB~L?{FSP0?~T8 z)36WYjKR@^Y#jEr9!UGBsgo8g1}L$HcZUu#@xY%J;|F?QwqsU%`?L}6a0rs!Xd`+i zq&lr%gV)^Ru{fN!x&4KD;?#KR#TohKfD(R&j%T-LETyoHn?_&Fm}e(-9T~qlj^tQ{I9;TcU!+5`GOBg9j4Dx zi|!q}B2YOSW0m5v9ZZyJc30rULCn=w$zuX@|4&2)%`b;-y7AnUM; z5EU4<`jQ}dUcG#wyt;u)Cf@{o!oA8UP|4ZYpIda$nA27_+b+w_F|_v1R&|m2R|oJ$ z*V{t>MG1F!4yDuFtJatOTfKYkZt&%FKVirE@rPbb?NNdX(nM(q(zj4$>Mj*40clZh zf?`yZjFO|FubbJJ*6+45VJu8{SSN9UBDm0=ATNN8Qp?N>kL)xcTb90lHLaX2-`J%Kg-C1535@N%uD1puZ><;y?a>R zPu+~ExpiJ(=*)h>g7j>)%-dCi{Np>V#{|!Gl*-m7YM1A~L)V!K#4B0n(^V(-*`EG^ z@5@cF9qNW!@~q;zy(X}o?42Tlw{ceQw?`gWSFGbGDntj6Xis`8#NNM}(H3l*pls_Shik(({7}2a}#YL%a&xTXyUU zJx4Sj>S?Pq$BAgZ=JUy(AMhHdmNI8%hsa0lpUh)%IlX!GeEi`Td))U!+;h9MkH8Pj z#~RtRivHzl=AWM*&a6PcG5lMW>}|p2nYe>VGOR`%=&fyvR-4AS@^>B0kJDje)%1&9}ak+-<3Hz2>GR4T_UcU!^JC$zkQs2ix7F;A0`5xM%ozgk@+hldTme3RVE zu?t7XcI%_`E}RCZVOR47i-5bEZq7)09U=%99 z!q+3_4%Vo5M#rd3-gw>I)8?fH0`k(|u~oq! z?D|SfF(Y{?@v;db(cO|4q+x;VoDAWU8$$+9oFpw`^1@ z8to%EWrK+qAmgrua0bKO8AlW}&KvH|5;7C~7WDtI_uWxVW!>90x`2v+Qpbu)6Qw9E zBPys!aZsd46QviC&`VU>C?YBfDosQM6(op)gc6E?igbifLPVrQAOR@>LXz(!!5MU9 zUdKD@bJlM${|K(}+;h)<_Otgn&)(;*`dE@W2lb_GXN1gBd#lms-QKTEQGVF!fUNB6 zB)Cz|r#!c)b&q8nmhNuSjC?Y64JblOQ?e3|r#?!iv(bm^`m~M~=F?U%pT@&{n)3gA zn&{~B(p4_qI(Uuv{LN*k>$s#?5jV;aFyWQH*WRWBX1CrE;dvoRCUgrp4P7oS-HBU* ze=9a(wREwV^e+0FeX`{6yOQ`qzuEZuw}tsXR=f_x{cdDlDKUL})DOnLIQyN2BdWKo^;7xA#js2KL)q-(ACP~w4@4`w6_c9JU;D$7gFP zO7%Wgueh<7hpCDNQw5!g9+A6&-o=iu-^c!7pT_U&nwNcCymSuK&**E*be+Xgq+i%1 zyY6$w6~9i8g4GLr{E#7Uhr7M1q)$HdwCnW1%BF6xo)?k^2GS1qh2E?0j~7F)@o?PX z2IpVzroY5>Uyjw4D1$jqXFso_iL!3{!%i6IHj{@@utm@Iuid%Jg0)-nZa~-FLE#kS zIQOcSaKa${+(UvQlZT~EXDtVRiVk$uXpZI$95^c4^sNX&S0^2A(ACMRvPNsSJLX{# z?VpOHMa84bxK4i3SQ5{-^4euqF29#P`XxeA_YD$H-=Xl+S@1oTlQx-}a)t`hKZ`hx zDM{qM4j$IAqkVJI`$i_cv+Gj$B?jDwa0MWJuWG6$DjWm*1rNPig++CSd$>Z+$F zr{m)rx&aq%j~i~{_paih?!NMxk7PPgFp+X5kSin9dUd_)*}W?&ZwGP}Z2ez#69(uq ze5J$CE3{`sP+%YF5NmzNd%$Wk%4E2T$IrB(L_r(Y-CL?YJ^& zbIg;htl!QG4sME+t_M3x=kleG<%1Sh3CJ(1`eo&0&R78^S&b_xu5zwLZMw;jd^;PR z-IT4^DVo!MH^nt*JWa`_S}I8e7JOs1X0tjG=!9XzzYqMy1cY6mCB z2E+YZDi*7s-w;>#%_H@L9QNwBE^hUztHe7*H~94jk@4Mih!y%zjrtHL%LS%(jm300 zV@Ga>woAS+%-zM^?{zb=RqBBxE#u5~Be_;K5}YFZ5rdlSz0-BpR{Y|*f(QxH`Y_U! zH|oMHc_qf}-#EtQE4el#Tta`QHpVx4Yd-pA9pcoXr-%Ds(-PSs<|T$yzu!zrs#a@q zq%x1Vl#~b^>q$}6zR{7rByCld&JEfTOnp->hp?;mHtidjHt*AVD>m{zcz(vLQ_97X z--x^E%ri?-BVNTbt9P$jULMS0bzp+qO7liu-v+1c+8EZ6ce0Hw${aV)zvVpLjW%m& zQsXsxS+&pUx-b%{d42Lh)uQ`K>laFDjx6dy$UF46pNUWsxyf>Hz*#j{VqsL6{;{IR zrv#LcoN26%MJ7m|G&bR)i)${jTbBfH-7p=xb=@1Y(M8$uEK6OtogNkUS|KekRr4t; zB(P*UY_bK_%fXdf^LzSfK7pp7ZLnv?C8Or+EX(X%N~Vb!z|cAvZ`muxB`-S4qx`NS zheOw91)u+p*HY5Hk!`sLND0T?sLn!2S51|w#kW=7a9CLOZ#Pc1v7+9ead@v3Ny_p$7_riiHo2tEh*X?D;>xMioCfHSOqZer{+{NK@vDmvH zzOT=k>sxpeEa(%ltt)Q(bt1C!B2aOzV~nu_5xisj(kOn@_klwl9<|{E57OMLNm@jv z>k;=9NZbvWs;zz=%lt|oEs8SN^k0})(l-ab_PLjz2+j>Rchb$m#FgiCR9{Ga{4$uo zJUk>YDqY$?;r?aC&|zfWn5wQ-{L&G*nooEARQUvg@9oXWA@;F#d9+U)a!<5)I`naI z&4n|+{C2%?s$F&}Ys^4xMA&Mt5uakPw3QZyk0-eNwq~lF!#U+@BU#i1y3QhueVc~2 z8ry}qoM`cCeQtJjfmUc@#f|Mj;Spk@?pV!)%~t&h5=yBY$2U|qws;4pyt=M?RuF@u>tgAXo5zSdE&CJh zHcFf9+dRE=&Ar3-Hk*aqTWPYn@f#vs$+gS(lj%}V!L@3W&4#1w(GlZYT9jo2rlwwd z)IWTBCzR`ez5cqg1JS6gVRk)(Em&4rB$|Qu5rdDoYeh|J`|XRiTMpT>Z|3&leB)h^ zcyDE^-2Zx1tDNCzaC8JtZFz);%hYsskoN;!g9B#5*XnP(T)dtZV+(L{|FDUGxg{O- zX-|7n8flMH)BUd2pV4~pu4dV9LZ2?*81{u}ZytrG9hDs zgEz0y(TZB$BjdX{ehi+5JYr46Atg+tuGQGuhIsBcUzXyy`q6FHOV_0`>5mG%DzpP0 z#(a{$h9mDbTCm|Dw=CBOu3HL?kGG=ca^<^nbbJWL8)ub&>_~nW5ZHw)+aSb6>DyP@ znRZG*^!XZAO^FYLU$S3E=wc|ldL&fCdEh~*bmS{3*K*$(4~=2DvzW5R;pi&tTydlR z2A#vhtJ7d7_A2qVOeOkj0tDi&HAgfk>8$9whL-B%$x2HX zN?Nwn-x3za^GvdjhaMF>zD}#)jG5JoIVkn+PU~$Y?R#Yvvt+LEWBt1Na2q6q`o~@3 zpB_msHw}Dqd^bgCW$f+8e11zL6wjJTc$!Km`bP007iCMQ=Vq>s)w0Q4?iV{qv~v28 zDu|T4IPpzU^nS3s?Lm5sD6?rg`{b%isNGZhj}?|2PO&EL%A7}^G$s~j@5FF9`LQx) zuks)Xwr7xgoW$b^XklV5TF5G<(?Z9}1dpIJLS;+;GqOZ*;H^*{F+Uos*6{J9zy!}v zh^Yt9Y|+yvxz)19!QBn;lC0Y=d1`<5jS-3)&eF5bADH`!mlT_g!dI`NUmwc1*CzR(t7h^QfS>rQrLbf^7ju zKlyzQx!=Tuuc`4gvbiZ(LF!BfPwOqDm?@9V2rQL*SI(O>HOd$)VL)naZOCoIGuJIM zy7YT+naD7YwTlW?PgNpNaapxRW`YCD<7$8ZhI`2P^7&_{q0K9okP@wyx2(1GB_A0! zQb=sq%1zIecJCRkLm#rZaB?fQc`J5t^GJn3qK=nQ^-;;91IT8#P2+hh$%C4LEQ345 zWH?*Z)Hs$*vrorbS(Jw>TC5yRkiiZMrDCp9aojp^#C<>Ma%K)>jDn3r(USo zLNaZl4&qikR+*A4+}yOwWi(f$DWO+0J76JGvhKIb^V_H>F|ndv`Gf*C;ce8rU$1v) zX>0kia$zC0`egV~qXy@mFKN9jA{S_?=@91{8!%zm)dZc=$f^wf4>SHI7Lx8^FI0Pb^o|HhyQ4 z??PVW$qI~7sM`@Honig9tDQv^ZLO-;oADvy1JA=>yiTisvv`1!e!SU!Gu)hD6Han8 zx&{;bK!9gEiJgrKEZP;nfQ|Nu`_*sptg?0rIK!RAT*s;sbrAxpEg-U-an?pQ*NIg~ zeF$7Wo|cfGzl;CHK~3L~to*+-LYY%G23;r%SLwecL9-QmuiJda1RZcu^$Xg@Z_zHX3IiAdh(}a!kI=CT^R7)PW z3@?>`Z+ze+BfR2j1g_z71`e;CtcHr(7H18~$ zi@U@N7;%15x&I~x!$J-ss~Az+S93-3a&?ty7_$@#CiFz?YBD5b3s0K4f)F@T{(d-! zjB>w*8%K>*{yu_sZRBiyeoWOqcVWqn^6QlTlYWgbxAKP%e8#HYXEn1Fo>QSk3hjuH z?2JIJP2&(QiAJs);9%3R)?e4SN@17Ip_I+u@GLuz{@}VpvJqJ}7b6B24b^Y5s9nuf zFu742Da-#lK9U$BK`gk@z6RH%rn5;kq=cu(=hu^6F>clpiN{%-Ol8bjB2q*F|}8LI@vPKT39KBo%IR z*&J><$r+#ScdJbLgq!fKy)6?b+cB^17%gmz);_xMiJjKOj&ReL$MxANO5Qd|z21MU zcrILwRGkR!`0(k;4#xou=F%eB@Y5;5nYH0Jo_a~~zg~nX81fPDI&0j%OTa71_*#TT zc|^R_1%9M+E}Z|DaL?e#tmi>etYbb>$JDCs#J%7jm@985*o4}-5^deYZa1;OhGHX@KcjrjQJYIC7?$VH(0O@ks?UaD; ze@^t}2PJGv{cF~+@2n(PI**uTlEuvqv}WdV;ru*{8l=c zW!b@^R(d;@2?Yrym8WtzTu|28MQnJxuG{^Rxw)#NFY}zDOpMHu4-GDq9f{cvN;S6nL9a^q8~y+0 zX%`G?FS^%O_KINrU2JtWnfiHg$R^g;DhQymbkHvf4sVh+BbB5~KJ}>iWY0VB!Tp8p zWN^BLW?Zj9I?_`$H${p!*W$UNP>Y*9?>ZI3s&#qX4kwJCr>-!5E_Jlzn_HG!ciyMT zcRhu#>%T47Vw_dk)G=5Rkw){lYPV(d>Lyp87|w2KB7otEqi3&}9XcVc9+5_WJwD^i zVMwr`m!80x}OZ4P`5@4`~`LZwltN(#9+w4_=%km%7~H z;;q~FQ+G&K?T{{bSzQ-CkcP8$R9W6`>PP5qXuGE|IqE4j8p!c7C5OweQ6T7^2KV6M z9bC?Kg3FxfPc-RUbS|Q@?5v}PbLX&?hVxtdgxcFOx1B8om&KKT<8dFI2q+E~okQqd zqP@3cYIpi_#E&g-&SiUvexxtYkIG^_CKwrH9dz|+&jlUG0<~MZ*btODXXF@)a z0T}fpE_Ov3LD}G*?Wx>$X{XJ11x=k1cznCZK(Fh7_qsH8$C6Owh5>fJlC!m|8rc;z zb@UAm$DOl@3o=)aA)m|6D!eUCViEnI&S&ZZuj|bPY^Ag$2P60a7q(fnKcUB6Qcxmx z$X?x}KW2HnzlQBHr(-f^?B0~64%|YI;`~|1Sf!8cs!B=t*4xc2CQH>0wgP_{5~s6m zfrcr8U%9V$U;FfX*s2ZYQjIlNkVjvlgAA0xhO<{!Mpv=3!T)2E>^kMiV3#!*x+`3+ zx$T*h`TCWuKDzchp?R8C>)8Z*+D%PL4zzp0EvH4PwM){6frG9!FKsPpwT322Pu#ZF zba7C2ds<7x*TU{HNU>yfBkTmP98tWLb&OXU@YTjq-Ur_*B?Ms+I;XJ7`YCfSFewMO(yolg<(r)o`IyRy-`+fn~xW~27ZK=Z=uy)O_ zZ;RatkxcbzY%8ED?^;7F_gcb)$j2 z;m*mWA2*vkKX*${ZSElE#(B$)$9M7=VRLJ>?}hAkgS)(F?CG$J>eHSN^a=5qWeID+ z(&^P13M)V1NbHI7y&wfl1RgkJqJ%pP6Y15_P4t`I@^^Ct%URE<^1a{*o}*VF#8rTK zW&2D!b+M@bYO9&Bd@CW`Bs*Epa;vL8}7{wRWSIy4jX% z5=REgRTiqfI{prO*0c5672v@$l%FI^_h6YNWpaIlU#+i?n5=FTe0qvSA<|c9ZbDos z-z75oDYsqlY3vxwAX2vP1MJG$Tby7a)s{tbc8jsAeB@G|^xCRhfl8SS_FLRitQslN zF8tDE;4UBP90+EeTl9AX-8wh0h7QDp+aZrqTEPGI9dKX#RJd*TKz5y-!8>c@l5CwM zLTp{!<(Gf%a94aZ*NWXZriJvv;8+GYE1u7h)>1y`&^OIG&BoeqE}=FwQFCPPWV(=% zGT9!97K_>iml%JDlNRtT+lyVK!}vxU(Iz=&BZG0iTNdum9l+i z#m<|}{Sab>Mf3#M$rKz-+C_FLs1Mr-WZd4!|6Pw6zNK(?pfD{wkCz`d>2)JA`s3*J z3;lPuJ87w{xc0cnWu;&HB)9x2(*w;rdW=zwGtjiBo~myeJlOX)Puxy6Mx8U!9bE~k zrB@N=Izd@+lW_{(oECqAbn-}BKu3xF2CO-kNBw|D#z@0G*ToM?&(`x}w2w#j-wn^c z2N$K-PkcV0R5Gi$3~yn*<^xnv&F_8A>Jx0(C5g7Vg$gfF&k7apvT?r(dbt7|wws-e z|7HC7NQL&h>}xXK>#q>NaqF4uNOZHCRAj^0J-hLx7nJgcF3Wgp)?wQvj`VrEe*36> zU)D?dnTJdMc$WDkHTlJ9AAJ1kev5~j4B|U?r#zE48GKN%;C+b4GFiWNpZrs%zsF!b z#bmLJ6GAIQMwgLTdB6FG7vVDb<=VVHnLXv&6@GJVc=s}nBHt@GmSHls^3-pBrY{lk z8(2JvXDK`jFC4WL4^?~2C)*nR{@FS2SInIb*-y0M(++dV-;e5-hKPMSUKJj5ku+C2 z8_qlta%?iow6GSrTW6o7I~Di58UZ&y-k(q*iF{Tf)_h*jS$o)IcRthp!IXka);=N` z3NIv65gPRQmuZ*(@A+TCAdGXy)X&$Z+>mbE-+wjTU1i<$j`i6DpZrBC>jvC<6P?~= zugn;3w;8@li7%#aL`PnQidJ@cw_Lj5lYh?Sm+!Sd)(TzL_;Sk4$SnV`MB-~AUPc69 znH-PlQpVqL-fU)y5Mug_5eIXr%*Hov9)Yu98~5<~fQ{j)xy&BLFuOU*2D_RpdViPt zb&J#}y>7ve9}Fhd6b#}7MSN=-&PARfogLp&AV9XU@d{&;3$LP2hG%Fe_f+-e z{x1f9rL%KeM|Ay$w!$-XBd-`>EDm_2nf|^Qkx$2+^Ab|DKYnYEcRt*Fg-roJnXgc0 zpX**=T>V~{k}TNqM=iscT1ED+UxUm!E;J&=@q~Fm?rveL;VU^Vu}?$aH6)<~kZx(g z92CzaT@+sVjfo_W_*U*u_(^c2;9ICKk(eM3TmZ4m{I$nr8Q{&RQ>Ocx<$E@pp=KUZ zf3o7!Rx>s~>j+~M&#rWSUrulUyL3)>JI`>pdyY-UZqH@W8J-0Bn5GN&H1O$0Tdwt7 zSgd&T*P=zSk^^VG`h7|kcCpd;=Yi-%GBqxNg(&Fu4) zN-iKbIt~l;!h;IPWvULlumZ{#xiI{?opaI0 zAMfMjRnRZiW+az1A_9VeGG!KuhKcXFRN_f zEoo5gC-A)s1|HDE9&rD-5g6YGe^s5dSkd%X)S_5vo+s-Qh5@15W!KK|M(pFuHsOoq zO-0V#lKx)OXnB98YB_aeZ*mdJJ8h(XLyo?(Wfsd_No33WU$oz^b_EV$!}X^_*k|wf zHLGk*YKz8qIs|xGj7So%pjm1II&b`j3?)x;sAm=63ovYZbUjOzz-L4?@Yg%Jov{hu zt)KN>u=T~?QZN-k?$i)piqcO(c)7(>vHTb(a3TtpqzLd`ty2=6iIC1;F8udf_Ibuj zJ&VEf%o~2lHcuyWQl84N`JHv9AK?QIeWplW(Wr$~!iD9h>vHvT-+O?s5*e8l z8l0SFqLr+JHU~EnW$UExjGEY_jauy#8&pt~%@mmqb|$AyB9{0CW&RJb*oi3?huA)% zYMBjQqR;h?O8C*O;U}-lCyVw3%Ob~^{5xV~_!jov(^QJI)y7vSR9TnZ*qYf_-8J07 zlI62h5{oR28)C^;527nnUSgG3L2|0JBhL#7T(JC`@-khl+Gsc zIWy_+og1}E;F?F9$N)>W8goR>O4JY-aaE-X2C$)Z?i_4b#mY!Q4ZO2GJ+8GOw3-aF zL_vvxQ@n}0gj~CqSx(jG6VP)7mlP3%Gip0+S5z8x6oWKy$DC=PB11@veUY`{PIB71 zJ;^)KVPz{YiqCpC;nD>J?5>|#PtiURMhNpd1e94o>;eRrmw5Le7XB}8bS1aa18muDJr?>T3$|47u z);2II%%A)xL#BI(bX!l^$=h;nRrJor4ofMbC0)Pkp38lN8SbOo z+2C}uYe}U@Q;&g>^jT*E$Lf{puWT`2VVqCOJ++{iX_r-%bEW4qb}7j^c`3?YLp-AA z;2&?@v;+PHd`daPT7@rmiw=MkAajnQm&-Omj1*wAs%htrS79Sy8CMEuTedacQVFs0 z+5IPWOx#npO1b=#36@1POr$?+Sy_m{z}i5UXHnAw1+NvAeD2#Zf0&zo%s(Av<#)Pz zeKga#Pqoh_AI~`Vd0PvAl~*~*%o{M$a}8D%Ub{crHt4YKyp!U^-)kM6&K6GW{=#!B z8FvcNZ9P;a`xPJsNdE{uHSv}Ky3(xL>A4O3P4B-j3aZ2;?z@eGS2hh-DK?2SSsD$N zUotHZ|9LxHbik1S5AjfX_Py-T;E_%6JO}>4Dk3>?~Iet6kGR_vXr985M~`t7n{ z+2wq08`EY8p=+)^!3-gA$Omes9~FZlE{D4KOw{we!o7cnQ1l5jW?Eop*V*`; zez2$(>C)iYu=_?=@G_^6s1n-;%rJz!YJ%)>xFV%YWtcX5_F#C|t-fq>#{ zTI>+3V9VK0s-FocEV^F?l(eD;{~+S=Kj%*?GIqa@?11yq6DEUIhTUIH@ZtB9E12MQ zQ+!T6BTc5KH55ak*-0nkFTUHQ!DuO8jAr!w3x?gChC8tMA0)7qo|0fbj7#;J+BYwC z^h7!Hj4x_SU}V`KG?(cP{)2=IlRg^jki3%^@<$5y_{-TX4fptd{vUG6bh(E!7p}Tl z;@iA$CMSIG)qwr*e==aa%RR3MkuL_kJ2T)kt=_|Szl)@iz{!+rr(+&X<}cedx(8Q{ z_~nSz5iyQMlC%Wryi>c%MeQH#IIe2M@(4YsW_1wm#NYRGfl`20}f(3*oG57%t7qF#y#*6VMt zpjc>LXQy$9<0j1ISW%H}Q&;h9Jtd3uVvwAMh&I298-0YP_g>A#zL+y!tF8E)LZy-X z*~Olih2hIKmLN*Pw(>s=dl@{bVy>*N0~aSDRv)2H+P}-M!U(VK!guh#_zf;DRkM;U zMighFsC7!7X*kY|t>0>K$H`zFK!MS=6v0?c7`3c!ykeUf#0_tjFIVVGZwu;RCj6n+M-3@ZBhAm0e#_~MTn9Lr9!WZ+{7-$+7nY}XHU#9|NACJ z6h$N$=If<-<2sh6uNKml?Qtv6vOzvvxAQyr|7?*@yZb(*8iO=gfd)Vg*vx)A{Zv8V1s|2Us1iQ zpWdo|FsO*(yB4NZ^;We3tLAI}og)Y_9AW>&Q*6L{6;IrF^wvUaFd<4dDOj!@oA{^C zgWub}+vT&c5{1?zXIBo~z**Y{`pja#npybw&kPfAJd+GK2RKin4xP)SJV~<*K>z)_ z*Z=tE^;cq28(;acua@8FyO%%0V`lj;691T)$Coo3_)gZ{&`Be}@d)Z9A}TK~-sW-* zjfg%;op5_RmTi6Fc_nU;5;HLgqmehlXuUN5s6?2qEsRRcifm{BSC)HDH4K1%ptsbO zwr+xkrc6xXq-Ye<5P}v~DUJjfqptHuR}OLYA{W&}1Hvs8!f-VKd@T_EifJ_h29j#j zeoIoHWB|-pjZ!z(J7}@{vVYsX<~CX_b#ZiHn_osw-ct0b86HwdJ6m8$k1ELJUj>!M z3bCp7b^ITrBI#k}UNeolQ(>|OmRu$K)F%r}sx2SOj|4b%Fk0+aOy?cTFKCBmPq=hm zU);8DdRt}JlJ6gAj@|!!lw!I4A-Id^ZwCDivLM!e8mVQe$r!x^q4#iRd z3}>6A%D@>)O0LRAjexkMn(g47>S*#_71N@!RTOmvl4%u1(_Kj$Jy?+2X0}igP<^NZ zQZS89rHZpTemt>oinsB$8rOfPmNR?&DGk{ zC?U?^`HU2__~cmEl+!2Y7<1P!UL#Jwl5Ivjl9qISN3xEedxqp`DrLp6$69W8I-8E< z&MxIKN)6r@d|*wZ#->nx?j(`-^`-YZ8!RqQPZiOsDEg&2r4@+5^v+l{tJQ(#vjGI6 zSgG092w()BQ~?dSU}k0lhPpo*qJ!6tt)~nPTlhIn*ytIBCdSNO@^CNwsphXI6})vh zmG5DQ{?a5S+1XD#-5y|NJ5^r|hxt!8cL)`>@I`m_cF%T?_h!oNUxR@e@Ez8y+?~o~ zU?Fvi=&KA_`82hUffExM1q%LI5>ll#l{0w~15zMIdj2gO&^X>QR*4ay<^89$uUepM zk>ly)&Mx$L(@<3caw$x9CM*aw6`3PJOz3?44L_TfILwu_N<(4K#y7a(`XRjQ{y>Um zX=^1RERxo0TB-!BHl07)_#hyJ<%ua4{WWXTmkvJ8{+1c$OHzGnYLkn z!|*Y_p!kQYgwO-~mt$yb*t3@T(a2y2_U>gdVlv!`<2e~^0#^ZlSPi&(Xu(M=VJ}z{e7 zlxdnLJAG+7BMrh@-v(M8%`*j1<}?CX6ob8_zvcEk&tevi zEe})gstpsFx<+eA8h>IzBbkr)cQqzuXIkV8zh6jyn?I@J8|y)BNK%x&t^U5&R%Gh( z?!-?B<;I?|ep*LFC>zxt`65PbS~ZQhtrz1U`1Cv)^uA1tppa^-mN zNu-G3AECz4>aP(`pW_Pqb&XU8%V_L;aW9M%ibyOB8z*NQtOwCyh%&?g%s+azh z^m>hq+A$&ZK{z_IfzqVw1@kZZQEKu;;V}3>$CNw>C{e+>4#3gR8h#ih+NCM+1SK$) zRy+YhjMXIxgQ*O{Nu_L3At1a;h5eaZnS3J=Ijpf>>R!oWm$J;9gC zAWno$1uG6=BK1S|Dd4h8LZl}O0@?vii*-p_5OGSiOd%&j#3=&VK&gX>Qy2zMwS$OL z@c}sEDMXz92jEfAi3T{8^+che;#5!tYXKFf;qinFs5mXtB^`x|)8i@RM^JGJ`1CDA zoT33v9U$V=0^k%XpZ*8nk=|KD16L^%U^IW{iM9@*@*j`f6%RVex+LeAP@;EycVj*0dIkfbbwN*1oR&OM?q&zgD&ZOJi!1W znW|?t1VBxvBs@`iP|4$kF6jY8PEQ0thnm&#sbEtea##RJlp7(27QF#@B2-HM`QRXO z(^LoHFp%^^T@PT|K&U7MYYKx34}f&Yb^#EB>@C2yP+>{|9tV{?0s+*adhLGz9zo3NS5Hlm>z|g$fTe*n>f}3xHT4RBr*cMMH%t@Hoii0iX`q zYkxjG08U8&rxEdl9Eg59uL98}_s?44{}~mCA-?>4cmSN%%&S02jMA6Sg%m)Un^%EA z;SEEr{Evu)0H;KN(|HvLlxY2lQ}nzF^aW0TK0Le~Cwf5%l`bg}QK&fW?8@Es!^J4m zU5!9yAcHCrQasO(R+0Q0V~qR@^Y}Lut>%A075g_7E!@ALXd!g}1w|_Xs-o2)Oa-U> z^GXuEUX@Wv#;6fun^%%%3PM3e+08)CrrL zyN)@emrb+P+jS*RzU*cZC~5C#p|@kkBe}k6Oz|EavYW_mpfF3I$-|4aXLl}qtILMZ zv-qnnvq&*9ZX75FXB;~D!2&He&u%FBMsJsAiOkn+igl&Qoo%`#W<@x$f>$bJR=ZEy zH#)m?F)Uy8sj2#U%lo(Csmw}j%EZ}wv%7S@(JG1I$g}*a??{U`GSn4Rr86p^3&df_ zm9ty!1peA9r(z{2^<^i=a9?NLkn`swNm3VE^z5F^rf)RMNerC(s=-D~O;xCH5RPCJ zgp&fNi+-EkwD*l}l7V0|tJuKnPQT zui(IPJZpfq9H6fb^u$404kb^N>mVH3a)6pc#}sIu0t7_RAqdG+TnFH|Ry;IM0ZoQY zy3jlYG}Qs69FnK}d}z>|CvYGngvApQA-)R@RE2=jR!AX1+!KX>Xjw|BE(vUXApr~l z@&$W{IOkQt!XUaE70@~8XM^PRumL#jDMa%5`QV_*PXmpL7EhpIYeH$ZH2YOQnl;!> zRHS#3bV)Ej`RNYOne$`$U}8=vP6bOFs2lR5ch$^lx&HoS4uKU4B*JM~TBSs~ST^hS zjPK9Hr~!@>1r3xMF>W-yW$H)LD7%T8e_=t;|H6WxUBFwQXf4UWK5Rdj>?3gh!lHUX zUQ}Etq8&&wj6Nf1;gZ?k11W0Hh-HvygqP9o1TBYQwi!W+m(1=jXfcMVl|jlLW}4w3 z#h9NDjtSRN7}!zjG0N+qnU;AN3C*;OZUbnh1?S!1=pLGBnbq}>Oq<9!s)pwG%w_{< ze$OoOhvfG^9~{#;ofhD*0Bq(gpqiF>=mp8N7L2lGXr^VB3qvz4vx*y%X=NGJ)6o2$ zS+xww@0rEq(ER@AgM->OLR8B*q zbmp~2kooqeH>CcA-2=`JOI^iT?{q38Ld) zP&qsxs~mO{q<=v=g8d5%Li;xs1f>8JL8@&ekoLe;ia%83HT`esaX83}3UX7ow$Dvc zkam>3^STfHlI+jh4(2U)kd7O~=S4w!pEjsPM03;fKi@J1?IdYl_nDnO%v|mS$?t!@ z?!zcEW!^FMQ^5hGd@RtO=5?PLuVqva&+9&n28EgO@}Cb5AmyWhls~WgFg|JVIa)J6 zMgb{Wn$V|e!drM_Q@->UN8{u=`~UF4L`F)L6A?* z_kxMMpXsUn`Ov_H(!lN>G2ibqdw2iy`+XSw!9QR3VKk5bI5>t8El*sJ?azL9;f}$3 zN36~IEzb-n^Z%gTkgDQutbJ|QXqAhS7qa^l>dUp)M4gSrx66lc9B_X_8hhSvAQg8p_(|>${^snvV!k$H-Pd(2HbeZ$b`nu)a zu)CcZk)es8c}-g=kO2Sl!Oa@Kc!*W%aMPqb;3)_|764csu$ zm-NSHf&bdrWfzq@`22NfRR z;2#kH?(AojPN|7o{3ymiT??~x>PLNMf2sKA3j}H^1b-A_;58UG|NE&I{^*ic=#rSF zQzOGHKZr2c=kFjSM9TiC!-4K@<^=-&Kg=DG@dRel*xSYRgZ_s2FF*rquiAiBxK*%9 zgK%iz084s5o&X7>N}%EWX#+G@35_SjdZHki1qW~rI=msFLm1Rwwc??H6m)p&s9+)a ziYxG1(BTcqWq&?6=mmZNrJ^cWFQ_O5WcnB)O1%I|pFu?FrFcRfRFnc5YletY6;Biq zDoTN2%pjta2v7>TP9UN5=Ys>Fv;r&!vy&MTm(FxDL*i0qMGG`8Wp*+{;?kK;W=LGh z>|}<-r8Aw(khoNwS3%7%ne zW^oQQlro#LA)z!8pws~(m;QWk0F*WZlrme0p`n!7LJSF|vWymDXeectl0ZV~Oban2 zlrme0p`n!7Uk(YSU{ee}iv=y>|9o%&l#&2SnGLVdP|ECvhJ;dP;R7_3GP|Lnp_JJT z4GE>pZfIyIWmd&NLMe_}6$2^a|9o%&l-2;0GJAI+p>(E(0}@J^y}Qs*%Iw{RgwmPD zZb&F))^I>WDYLN~5=vpr#%@R`{rTVkC?x`vGOwS7hEiw>1LL&Rf^q#UG?X$wc?1om zfJ@&(+~doFdx0VD@n`NPhJ;cyKq=I`^yh;E$WJx%^3%NhRP2fQ8)b1`e&YP&yN&yK z=jEqm4r^92K5D_xd*|gR4dy2;fSNxqKYgXb166QdeqvNgGemfh5zfm`f4B>SN$2IK zFQ^nCWL|#iUdG_kdHE^WguRT>bwaOb0$e&TKYhWa^YYV|Tskj5&E`_dy!^yycV%$t zy!`Yvm(I&iUvTNX{PZQ4&dX0Ad{(1((jtPhWEBy!`Y9moh(% zIWIrayPt^j^3%NhG%r7;1&tvWDwb@-EH$;1bP5_o&e<_IFF(!8PxQ|&f2)~vUVfUF zp9cP>2XtP3`iqc1FF(yrO#|kVpJ=9U3dWy1+p>vJw-n#$YxA~&V_gJyJlu1B?dA(B zJpu%s;vQ!T+KS4y29m4SE0pQ;V()CKRSKPccTsb4MCr{wiI+TvCF4j=!%`k3t7mY$ zr7ecVGXx7hmwtTBtd95sF<)-4akwm|p}!uC+# z$R$_}yU!0*QM|#4McdL5!x~+Z&G?Eb=ASI?x&gdqYl9k(jFqI(BGXbuc-ij4<=kcr`4$AL`0DJTgcd z!x>%FgyfbAakg4b@8}jy3m&xMPYV^bu z5b-p{PvlsMA#zD}sI%o}CoaY(RR=9MIPpHRR2W#`XsLza@C-GxJc{84_YDZly0f6J zKdJeYt)5azg3DbfW-bU-@k1>ihp&T-xc>%J0DnC>vWHXloGe3iD z=JEuWG{|O_8;4s%H*;o+up?wfxTuCTg3Jik1Nd_2jPRd;$~3BTKk(+_1Q$r8&G2T9 zaX24jGwUEzVj+hzmvd^^J&?`JH-O&=+03z)dP;SW8DWVZ>O5pd*obM+flmDY38+kX zlr~f+xLi=f9)@gYg8}?~=w?2yr}P%GnOFLu9zZtpePCwj#9x-+@(?odZytvmKxc%^ zlvoGI#Q&dw%20o(ElA^*`k`(@HnR<;p$fV;mnOK}hivB6$0xF%&+%+Iu-#HF^qni-f^YOP?0`S+&?1L?a5ThE|gBsq$pUM4-7Zc6fW z9_ch|^KZiI`#sw^?hr{o0r>mPvR}VGdE0Fnw?3gTnbUn+&>pD)E&kpXiiuvzjV?}? zu$W|Upz%L;xgE-l)m*9CBB=7Da1qpNS5b#v1@U$twF19pnF0YAtvl(3VcurWqa}N8 zaORX8yuroQscXbZDmh@p#ap83y)q%#wsWsHe@F20MwaU_>fVDvf-vtfYaQ(9QyktP z$G|DmWYA;kdBuv2C5NB$+mswLV)rWf?YW>~iHY|z#ggQq^{QO5C69(SPUjj(rKjeP z7CVaPPZU3*xu+PJjg7|WqAB=DA`W35NSe%R&W%J+sHMHU;h@)n$zSg#BKCsvs^Faz@DVk zsP`}PvA={^u*O^6>S!Q zv^;Th+D;TZg7C7Qd}6s*E{{FDmM*%<=XWy0Hr3bD{YBezHi-V!np)ouM0T z2Ho?Q9(>c*yXuyAL4rlX33>TXjp~)}Ub>T|x{|Jp8--~R*i_)o2?Pn19j9TfNn8_f zSX=QGa%XjzCLu*d{!@DbVI&XypYSlP)`kGF*Z5pDY$y0NG3=bLi=LM^I3Vdwx|`6} zASwnTo6n{Pz2k5;Epza1uQgUuz>nZ3Z>{Hvgm*7fMOPpAc(Oe(xuy2y-GJ!gEB0im z-ERxtwA!u~nLLe}tkm~NmQ69`j(n=r7L)W*b8yhp`@_9}X!?(Mp2(*u2()l$1qy}*%oQgZv?=9*BP^RtTS>o>>aY)f5VwYpPZ zA8Z?T8WKH9E>E8VLw#}@@_puteVFm4y~bzgmO8e^$Ga!6I;fd~53DZTK3L$bKH5cs zBNi)(=MzX?rz~#T(@rveCeeSc@ll^P&sXc6eD}-_SAK-~H{Q~%N~hl*wITGXf**5E zzx5yL9i^HR1{Jr1X(D$7L4tZcX6mnjE26w>DVT8|A zcXO_5+k-^l_e59#$<;N{*s}*gAh#jN6L>us;xUy>TcWSc#=cjH%QQu1;evcEt_Awq zix|Ca2OWxOAIurZrh4WPi_IUBYXtreq``nb5MfwdPKY zly<{ayz9w5ytr5G0R!V#sF(tG&H$9uCp3E^FWcMK7QN&0uU}Cs)i8DY>w|8ot0ZZV z>I;8Y&?QXz>sC+d=tkSD)^;p^^xQO|RbA{Y{7LrM5Jp*hX zZ80C+HO9K{UflO#e@*2Wuc>Zikb^~Fji!C1yArQE;yl*Odbw~*t8w@m7um>a#7V#U z*XGBqF3R^jEUEEQ?^hYP_nHHMrI5q-{8E(lkt=Vf?~fH2%4VjUTbdMAaC94d~o{E9x6 zn=&0Xe2PAFHD`hLp7V#OM*5ojI~EzmUuBs*nrOX_9k(=-Loj-W;_0EPq0BSd!4V?U z+{0ThaVt%84{hb)d2mBDt^D!ArW+Nh3ZC4^@-(kzOn1IeR)?8ExksdfLC-3&x8(%O zhsAsb`x1*iR}ZNAY~P6)Jnj@}!YRyKeea;8!0J4$ZZ8zyj!3q_H(mW>k9(wmc|=u5 zqq5aAt|eOw=5LCUNfd5-)DbUWt1xEqO!sOtEg<)0!;4pxD;n?a$v+W$r~9m#$PuvL zL{8n|?bxS{WBn{)D9Y_OS6UYaf{Q?gG~V)$!{~0 z1D@Rs;(Mf5Uat93!i$d&v9sRyo?Q>^t_i>A<0Dq@kA}oQIDF%}j&7@u$Qkdeo_rZi z&(1{%#*KRLC&n&T+2~fUl&jIlYjW(D0FTYVSS5pBc~>9Kx$;H?hplT#4Dd=WK)(i{dNEt)?bi15r;GW!-yL zg33ah)ubnTVvpq(Yx8^_g=h%oVu;g$6~?_*#$!@)vD7pH>pilUEoePAGJt# z=}TFoR92m`W9lMn{VTCGqio$f@9uWhz=)Fb&$-$<85gZntADUtU5U-J_-qjGhxd2g z3Dc80yYU3cK|HIUqx_9iSj%LOpqnB}nD(c|s+|tV?N3-os#;meC&Ht2H*zMyHg0vR zPcmCGz;o-)ZQd2@;$2p2Ae_YB?3Zwz8uf$6wW@En#%*yCqq5TZ=JoZWQn4iq7DT!( z_#3`i{TIGrGL0OaY2vUg(d{;#-NO=nUbXcF8_GluX&*6XJG*ny$VC;CveWj)E8ebm zJOvAI-*;jGhIXp?qp&G;b#KGb7ls$wCANR8K+t+K(EcN&9FUSs6LMgId6R@NSF{hg zO^-;O9&x2jR=CEt(sD*}aQ+h$JvlJ+WH;8;l{PVmKvRYW(KI}QG7;%Tr1h6t;0h@d zRVj-D$wL*cw5j1PB4UC{=7mwl1~XjM{YeB;4mx0pHr-egU$I1Q%7A!`(sJ8 zu^b$2u;B_Cfht2xPgmB6)5w(t=8=nE=L!bca6LeSEo>DLnI5tO)+Y( z4J`v}8Ym}=vk=Ik_4W+Wyy|UqTHF8w2w$%O++H%U|NG-@uDOIkn=tKDouQsoa%Fm9fzCQMPGo&a6R9k_U*i$v|2ujwsic#%e)}#-XVz zs%XAb_eRhkXbqARcvo?Coe))4zbu7vmtwJy_@Fzt! zhw$|v=qK^vat1x zr8U1HoU|b+XH9nIRS^(zx%qF7iFuJb^D=VDQ;8odGor~oU9m9A1QiP_^r4*`9YIVD zPUe;7e5xejUB@O@lSO`)jSQ^kO&ld6raCK#H0oqyj6__9o|CPfQ?%YOw0dSN%x&jj zG;i*dl8IU;o{!wkSE%l0q`th5ucDhTN!`sveL0>lk=m8^cm*QB4(8YQ#Q*($Jtsr- zQ!nomV~(*!>)N{4ZB~6Ub+76jto|cRpE`D>GG<@E6^*+qAMA0sqIs7ezsL8=t`jTe z3{GEre1H&FNE_9w?T2Z$H6skOEfD-(y(i@jSHs03by6(Q^@LAb2;p(&WqiXYw=Cn> zyY|Y&qd0L1ocZI4%XtSkoK8Hvp6^w6+&2dweRfMFW$#7L47pafi-s1daq;DL5^}Bk zFYfWb$+<`4%D(j-`!9N~Sa3qpXbg(8ZG zg$@ZtiV#prXdx(ws0gTts0b*CsI+M4B{UU~CejnCR1KjMN+|yccop~VU1IkC{l5Dz z`|OilU*C7moS8Xurkyz|+wK(0c&qF%*J83bz|SYv2CaYQNK{xDvH? zJvkebt2^a(enfJw`OKY&g4Wup3Eyz4Yn9cFZyZ&RF#=ttibn&pvuX6G;-1_3Wjl_j-d26eYk5TX_KBx_8;&Tg+PhWxC_E<3UUymN z*v9*9weZQ(*4yi&NE(~$?-mMd-Lq%iwJV!$tDx@|X6g@&T`MWx8}KGmZg8wi)IDu* zvy@$%{&dry&-vK?(J^tU=-Qk|?P4WI@p+H7?Ap_Dee7QV@1%m~Hy5VAn=9}AAuB`~ z++#r4Mdp}c*_~iqyW*SR7r$>=d;Q2KTziMO%k39OdIN8mZc2M}`r6%1K`Ig-uO)5@ zRgv6t?dB#kRsTD9P5bilK|7byVnuw8{uU`d_M69DHvNlA@VN&IN`jjU@BLDqfR96L z*GrDzN{;X2^y79_#dEW&J~{PtZT1H_sN_DL0PbzB31@bkem@d>=*5|rch5&Dy*T^j zu4~jm%QJhJ?Q>eZLo%@E!pyc#9LtuSQQKWN@|O2H!6M=cT5!ePLs2R_Fi#XCAP={1 zI6iFn;?%RdBpvTlFV5_!R`oj-Q?+A6)$8MPQ`XK)xt!8YM#V?uUv~QKizz!YlyH(D zMtU6GPC`6hyHinhK#A1hM=6%Q-<@?T>iCXY97oit7pGnZZH&@ zd^WwEmK~Wc4rL*NXzx=QHi^bf76q~2p@ek$X_nFjg_`M7RUVRs@g|V8o@aF)WtHCw zXJd{!x#QFgxW(;g+LJX|S}*VJ=y271a%SgQ)udCARXZJ3vpzoFxAVbe8AN|xsX^Ty z^?*&Tk!r(AG2MQs3fb-*>huBkT| zm)t&|w$-%fX>`!mop8ri7(jSvWFFxXmbkh0pn6el?(aL!+_?KG4%MzlE_9TtaEnrX za4Oz>oodvns54^wRpU-YSBY_{M&8+QpP5y%p@CfKkA_lF*5twz!fo56AAm@pIU#5s z2zm_!%?CmAL(swy^kxWJ6oM9mpd}&by%4lC1Pz6tVG#6T2wEB9ehlKS4skyXao3^% zxYX{#l#iUyHKjvOxzgqnJ4vMZ{NZ>yh#d}TCn_JtS6@ZPaE)v7+s!BTdD?S&h^>Gu zObPf3VK5HzBe7}E=_B?nTVa5M?i{g&e;_ucO^;ka7qKybCq$E!yymGRa7`rkqQ4F73-;v3r-1rR!huf8`AN-{vG zh^~pF=u?iljXzAtFXqgZ4z}m+!o*8m0O|^ZZ@is1q-=Hr`d* zx>t&Ag<)!1Mzq9uZ^fOy7Pq3@cqkcs6)5&i;Z%m9qvh%0lN%whPe^|Jgxg>!rCl{1 zNZs@aH@jKQ2LSdZifXBTRpnd%R10T#0z~A;Z7Abg`?J~+wSs7UcC;Zo8o`b>W=ET{ zqs`dS7VPNr>}YFtv<*A@0z2A{9qqu5MzN!v+0m}-Xf!(-!;Zehj`n0nUtvdIWk+9Q zcfY~zev{qZpWXddQROp0s`pNADt8Hv(FWruGVH$TW+y^WU!quT?vcKro##~3!p?3F zQVlv4SG7G!HS|=%zU_XhW(e-}nHTJx)H4PfBgLAt5=(I&p)!ct(Buv%vN-6QQnb{= zS0>Z5IOLJVP65eiwq|v1RHG#vUy1+D{!mH>lw3>)`x`6q=+W+CC(*HuEbikcsDSnz z-?rkuM9F4LI326KH;mGep$t&4X;_lcJNMPM&2J7U9h+Y-n1tJK2eiAGCPl?ggy4Bn zghxla(fZm3Ol=+wE**N_L-&54u=ltj=TH`J=fvHZ_8sE@RuIiRX|giH*XAw6XDunGnMA2( z7{^c+#$^1+kesDKyw~>?>K0c#svAtl3Z+Inj$aEma}xc819P7gXto#Y7G6y=<7cHA(=PH^PYonyl6$ltWWD9~F;qI775QFXV${76yQY3{3UYgu>>=)ya38oy)Osa%u+3B13Kn{p5A>*Pc{yY;PeAe{Q+WPTl)MET z^I@LK_M&vKk&A;?e>Lu}|0l1<&6yA^EaX0Z5cWdU1XCaVCVJdU`|_Q^5mFBalnUr>ZrPs)ltZCjd}A403#&PGoOI3^T`u^b;%$A zP&r9b>tFh9?0K^;rV3AoK9E-+7Y793C&xY>DEGL}(c@b6Zt}Tb+Be@x8CeoQxKD@9 zE{OIUAE>x5{A4#mDmpy~2qZ@HDA85;$>$4h&GCrd0ZTXrJ=~#8E*5>* zbu`Q_NN(#4_;A*t1P=kc1&Gqa(J2&8=_pW!WA6IbJpfyf%lor~cPD8wLyH^$F4N@Y zuT>mY>^_*!y>KDq_)(bGxd@%G6NI4o9{?VjRj~+bNIu+ z_7M%X56=jJ9@+X&(i()jV&kI7_p?Tig5_z<$7lLGzWTPo+yBg?0BjBmg8(4lT^?hX zCvT+%9wlzCJ^IZ>HkO}8eT)E0QSkU*`z6uQisPR(?gHGk(!-ugJC5x52IEs8FW?V- zREd}z-u_-)_ipxwLC(7v^Z5p4c;XJ2S#%7{3qu@9XJm|kzz0_Elf@PWURpt97>`+rw5gAR7aPx7UrJo>>8SipT9RNSZQEt zXtZ4@#v~7ucwZh6F&QhYsZb%Ot{XUi4e3}7;%eIIP*3BQY8XsayLntuIe>6F{!Vmz zc+xg4nngJlyMJ8AY9TAmAh%(t^5NvGLrR`nv7m0J94_>L|_faBN|y?=aM zBQSg<|2<7PWrygqeUH196K;ot@XErzUAa0GuxB&ON_mzfw|^i>cJO5EI(il}M)!8O z@VapwvBB$|E+23FfC>1kq)l{TA_g$o1hZ0%caXO_9Ix*3ZC4FX5`lpyf2}2FS276U zbSWRk)bwo)x0oI|O1(JGhEuSDVQMgR$qBgtBswM|rp6Sh1HP2Dc>yzY1?_n%9SY8c z5C9jVLAV%20zdBWzd0Ubvw$xy?0Ae0CJJZEP0&!_11J#!=5yyOY72*XJ1k)sm*KAv z;7@ls&bLW_7M0>-`EtI2HEn#B#~OWW+P<*}o+y-UAx{U348v;Lf|cbl6|R#JBV&rB z`5eMq(4N!5p)9#Lz#-SkrNYTeQCSuTF%_QQ?KofFc0LJu0$atEo|A*y3ng`L!4rSW zwm3N7O$89Z^96QyS|BMnnq|C0g9d@-V1jYy8T=6}HmpUvD;>TMnZh1_T93yh#6ClNF<+?79OYvXwMy%47tC!OaEXA?l z*c&8SigWA^Bru8P?!<14U1F6hixskF;?FHvE_mpMXWB9Sx5&M|A&_oFt(M*!wPOxa z!e-3amEuc%MfKjPWjNedYr*W$X1$m1!lKQtdAS36C@QO;$|Lq-rL&fHB{=hx?&60Lmdm-PmFo~jxpEF+my3s4Z;&QW7(p&mqYxXkxx3aOwraCzdhJI@XtULL zaUnL}-|*zHiiVWa^_bL9vx}81IWZESo{2I20fYfdj`h;fW4U{<0%c-3s#uO#R;wIc zEO#s$e~yyW-a|gOA`rc+wJt)-KRu&frZHH0nG|WBnC!7h-*Jf^{(M3`c*~`5nMRI1 z7t#+i&0}$kLl6@^g2rmIm$=Isb17$up{V{c8)hoY{_nCj`{z)4gzW-uDvwox9NIr| z19vqi^umJ!+PjbE`;g`AZipBiS+AaYTrhS+)#_9ej(e9o93FULx5O^D%Dal)+Oym( z@A8E$`wlyvgy+Ay(J~a8Z?ZW-ps-5_Spbq~&y;y0b<#<^N1*CEqsObcQQWd2Ia8;wE5v<sQl|06M7h51Evrp*K{mI&OU!vKw2%BuMntvop zk|&*%)ivUTy~jogpSv&gh|gBG=bM6AfpSZ78F)sgpcoo)y0IjYVkGdHxrXzZ3C zUO~~S!}qN0v<&QP&BhZpA^YuDod2%5kMmCo(8cMXQ0Y6)m^Jo;WU+b!ElMD=UK#lZRQ$JM}&MG z6U6huD%mS*S?q&T-xICluwF@?gpuk_c+;@Vyw%JLZ$bePqEoeq^&n_~^0;d_WPjX` zeh$WClzWn510wG6JQbIkt9#IV&BBwpF*})X%{l7!S8~h~l$-pMiS$aprqO5;m*KQd zYt$1s_{C0hMR5MOi|9@291J@~haqK)10P`y;mAjx?7h zLm{eBSW2*MQg{Iug~K)Q&rOi!G!rDH-q6S?B6SDYbKh}6IDeR~F! zcG~3)rb9U|zFUf$E>uQ!U9O}@1eZ$dN%nl+dxr@SnwgE0b)F@{%FRok25vFqyecog zo`OZx<$L~7i_;0CVGaguCjejkVI?5wT}@IwM!8b;Ktmw@sKQz3(sn>dJdJo@$#biz zrGWPbT{ZTKg)YO)1{h|B9@aEKSf370h57Et9%R1>CtX^TU`FzmpRA*)7~YFs9i9*W zWsT9cwPJcP>BtkpSR1{5YukuO`s3ahLobl(IUqp4y!s;yU%FuIvGJ)lZeF+lT1 zu=?}&#TG;wT?ApVN!CB0;@g`^_!O`LYw*W~L!UYV3kTKuJ1mpQIrPGY19g(mzbhkv z7o4v3yHuJeDKOl%_K}vHb?0R-uKXpC`6kN>0qgbjYUveh6Rlra z3obkrHl+D6%NtfD&qrkT&vY%}7Bju8o2@taW6vGPyZ1-Mm`tB?ZJ@!J?9MX<2EYFw zVW8-R0sR+@BKuwU**ddnR+Q06-<(;;foma}BwV5S&LPP4{{4}hfxynDvV{KV!q-XC zX~vQH{sn{hZ!mVz2?NRJk2N@uhiYB^w_x<+X6KUeZ+J-1i3ge2|0|4;e}f@T4~*c8 z(9#=Cm9?%mZdVG-JR%NcO*+|@dKmVH-hbsctT@VV|vkvp_I<6k> zd$ib<_P-g$?q#1BJaj+&;q%gL^YoL+yKYJB<|$$0 zoQ*EAW?XK}rG*>V{yZpTm=V`R-J{o4FU(%v5BH@Q7h9|Gl;NW2LY@}(`)HL??FK(* zML{ZbahX~jt|$DS{6$Q%nG(eNLhWCVXau1nlKVQ>9TTP)AXp&T^!YjlUd zPEdTwf8gKEI|y3DR#Qj21DU+}z%jNS+W0-otNy_Koc|zxkz4MAxF+^2?>(1{5(+Ed zXYbIWdoGo122wvt?`kY9-kbaH(X#FAognIL9prts2@+s1;SFHa@jw5=ioG-&Rn`2r zaC10LF=N^9bL_7{-IE~j>mzI*)5$ycGF~zl(;V^jGIWwHlrLNsyi6zKC^CA9o0;YW z*SZw7jIVB$zJ>B*#^iqSbH+&Ln~C&r?pdxdGa_pnC^5*&5cQE}E`i*253GZv8~HEM zDR)XorD&n}81dM_?ndp?f`AW;?p7hj)D@B?vl~YUquw&4pG^jdF z4%t#*$*04aetyZ5rHVs(`L^kGsEu+mps)qa0oHjyVSdIeDPbPUT{@d+%C$i_VV8;1 z@>JM=4`ir%%7ECD-Z`V7luB`c^?e%QB^e+*DvX9T(6-O0EDR`{T{wXCEZeewo^2&W zvt)Q(4#wy(mBsx7%g+-Yx%l}a>3&*lI+0MKq_t5tHfqXKq1*H4l@(<1^F`AAtk{ST zC5MptP*`|f1?HfzL+;O7hMFLmy7>7b>3(!4>2N5B{c(YzFP>#m^T>_p@<; z;!Hs^syA~FA9o`B14C}?;^&K``)P;dT$4XYx2>XZDib8Ty=cMh`LRQKJi%Y}dFjl# zV*EwsdQWi<8_Po8Eu~u9ny}*cO2};^48?K)-mxLt+Bo;fnApjuESaaHR9{J$`Z74HMn{~ zgHyvcz`a$H;+;+4YYNygd(VPq9=O253L)`tH%Bp}@^;m6aqbk^0&Y2o;EiY!0z>w2 zdL&6^3ZI_6xgz!oxa6TGM^~GTWW;QJMGd*|b?g}kY4PV*Zh>na zuIXNLbpu1blANr@_hXLF-RZCz+}okeY-J=E>%)az1<5t5TdHToZ|x(9U4zQC(LTv8 zvTCRI%A}Pe6fmSQd@RPjb?W}yg&kXI7fP_!o|yrKNm%B_ts-SO{YUuL=*T}9=<<{G47y^;A0;dlL